Defense Disrupted

DefenseDisrupted

Welcome to Defense Disrupted, a podcast exploring how technology is transforming the future of defense operations. As the CEO of TurbineOne, I’m excited to bring together defense leaders, innovators, and practitioners who are leveraging cutting-edge solutions on the frontlines. Through conversations with military professionals, technology experts, and implementation specialists, we’ll explore practical insights about deploying machine learning at the edge, emerging trends in field operations, and success stories from those accelerating threat recognition. Thank you for joining us as we explore the intersection of technology and national security!

  1. Insight Partners’ Nick Sinai on People Flow, Procurement, and What Real Change Requires

    4/03

    Insight Partners’ Nick Sinai on People Flow, Procurement, and What Real Change Requires

    Nick Sinai, Managing Director at Insight Partners, spent nearly 6 years inside the Obama administration, helping stand up the Presidential Innovation Fellows program, and keeping notes on why high-profile tech talent from major firms kept failing to change government from the inside. His core observation from that period is that people consistently treated things as fixed constraints that were not actually fixed, and that misread is where most reform efforts die. Nick works through what change at scale inside defense institutions actually requires, including the old line that says if you are not fixing procurement or hiring, you are not fixing government. He and Ian get into how DoD has historically traded acquisition risk for operational risk, why that calculus is shifting now, and what "people flow" looks like as a deliberate insertion model rather than a one-time hire. Nick also addresses the false signal problem directly for defense tech entrepreneurs: SBIR funding and R&D contracts are not end-user validation, and the gap between the two is where companies stall.  Resources:  Hack Your Bureaucracy by Nick Sinai and Marina Nitze Presidential Innovation Fellows program U.S. Digital Service U.S. Digital Corps Harvard Kennedy School Qlab Insight Partners Topics Discussed: Writing Hack Your Bureaucracy to document why technologists succeed and fail driving change inside government institutions Using the Presidential Innovation Fellows program as a people flow model for inserting mid-career technical talent into federal agencies Why fixing procurement and hiring remain the only two structural levers for meaningful progress inside government at scale How DOD has historically traded acquisition risk for operational risk and why that posture is now shifting toward speed Applying an incremental insertion model versus a decapitation approach to reform inside large defense bureaucracies Distinguishing SBIR and R&D funding from genuine end-user validation and why false signal stalls defense tech companies Building customer bases across MODs and international partners to reduce single-buyer dependency on US government contracts Why the most defensible defense tech companies prioritize direct warfighter iteration over alignment with centralized program office requirements

    43 min
  2. TurbineOne’s Court Vanzant on Education, Discomfort, & Veteran Paths To Defense Entrepreneurship

    17/02

    TurbineOne’s Court Vanzant on Education, Discomfort, & Veteran Paths To Defense Entrepreneurship

    Court Vanzant, Chief Growth Officer at TurbineOne, offers a veteran entrepreneur framework that rejects the comfort trap: get a formal education to build hard skills, then deliberately seek discomfort as the growth indicator. His metric for knowing you're in the right space is sustained imposter syndrome: if you feel comfortable and competent, you've stopped learning.  For hardware startups, he challenges the VC orthodoxy on domestic manufacturing, arguing 40 years of offshoring created strategic vulnerabilities that demand US-based production despite higher costs. His counter-UAS market thesis targets $5 billion in military portables from the $35 billion global C-UAS budget. Topics Discussed: Why RF detection fails against fiber optic command wire and autonomous flight while radar cannot overcome terrain masking Addressing weaponized racing drones functioning as precision munitions against unprotected individual soldiers Capturing $5 billion military portables segment within $35 billion global counter-UAS market using US-first manufacturing approach Transitioning from consulting careers to defense startups through formal MBA education Applying Lean Six Sigma manufacturing principles from early career to current domestic hardware production strategy Challenging VC orthodoxy on hardware costs by arguing 40 years of offshoring created strategic vulnerabilities requiring US-based capacity Resources:  Lean Six Sigma Military Decision Making Process (MDMP) MilVet Veterans Business Outreach Centers (VBOC) Office of Small Business Programs: Veterans Resources The South Carolina Veterans Business Outreach Center (SC VBOC) The Honor Foundation DoW SkillBridge Best Online MBA Programs Military MBA: Best Value MBA Programs for Vets Using Post-9/11 GI Bill Upstate Warrior Solution North Carolina Veterans Business Association

    37 min
  3. TurbineOne's Daniel Hebb on MOSA Compliance Failures & Tactical Workarounds

    27/01

    TurbineOne's Daniel Hebb on MOSA Compliance Failures & Tactical Workarounds

    Edge-deployed defense systems operate under different constraints than cloud infrastructure. Daniel Hebb, Engineering Manager at TurbineOne breaks down why you can't spin up additional compute instances: the entire optimization problem shifts from cost-per-transaction to maximum capability within fixed hardware limits. Daniel also touches on a critical gap in MOSA implementation where systems achieve specification compliance at the interface level while remaining operationally incompatible. Daniel showcases how he applies guitar signal chain processing concepts to build TurbineOne's pipeline architecture, enabling features that took engineers at other defense companies two years to ship. He signs up for the minimum MOSA requirement, then builds the complete capability anyway. When other contracted components fail, you demonstrate what's actually possible. The hardest defense technology problems don't get solved from desks; they require engineers willing to work contorted inside boat hulls with three-foot cables, no ladders, and trucks as improvised roof access. Resources:  Marine Corps Recruiting Depot Boot Camp Challenge (San Diego) Jocko Podcast The Creative Act by Rick Rubin Topics Discussed: Engineering edge-deployed AI systems under fixed hardware constraints where cloud computing scalability doesn't exist Exposing MOSA compliance failures where interface specifications achieve paper certification but platform security policies prevent actual data exchange Applying cross-domain engineering insights from guitar signal chain processing to frontline perception system pipeline architecture  Navigating misaligned architectural boundaries between military requirements and commercial tech company design approaches Implementing tactical workarounds by exceeding minimum MOSA requirements to demonstrate full capability when contracted components fail operationally Transition from big tech cloud environments to field-deployed defense systems requiring hands-on hardware debugging and integration Bridging cultural gaps between risk-averse defense acquisition processes and move-fast tech industry development methodologies

    30 min
  4. TurbineOne's Brandi Evans on Empowering PMs to Act Decisively and Course-Correct

    7/01

    TurbineOne's Brandi Evans on Empowering PMs to Act Decisively and Course-Correct

    SOCOM's acquisition speed advantage isn't about special authorities — they follow identical DOW policies as every one else. The difference is structural proximity and leadership empowerment. Brandi Evans, Director of SOCOM Enterprise at TurbineOne, also operates under a simple principle: there's nothing a PM can decide that can't be fixed within 48 hours. This calculated risk framework, paired with direct PEO access, enables the velocity SOCOM is known for.  Brandi was also among the second programs to transition under the software acquisition pathway, managing intelligence tools for all-source analysts while the government struggled to adopt commercial practices like PI planning and sprinting, putting them at least a decade behind industry. Her most pointed critique targets the requirements process itself: validation cycles stretching over a year demanding perfect documentation before programs start, when the real need is treating more capabilities as urgent operational requirements and moving to a project-based model rather than traditional programs of record. Topics Discussed: Clarifying SOCOM acquisition speed stems from structural proximity and leadership empowerment rather than special authorities Implementing a decision framework where program managers receive authority knowing leaders can reverse any decision within two days Adopting commercial software practices like PI planning and sprinting while the government remained behind industry standards Managing intelligence tools for all-source analysts through SOF Digital Applications requiring perpetual iteration rather than traditional completion milestones Utilizing OTAs and commercial solutions through innovation hubs to avoid lengthy source selection boards Reforming requirements validation processes that demand year-long perfect documentation before allowing programs to start  Leveraging field demonstrations and user feedback from trained operators to distinguish effective technology from vendor claims

    35 min
  5. Int’l Spy Museum's Chris Costa on Intel Partnerships as Diplomatic Safe Space

    09/12/2025

    Int’l Spy Museum's Chris Costa on Intel Partnerships as Diplomatic Safe Space

    It might be surprising, but The International Spy Museum is an important diplomatic tool, functioning as neutral ground where foreign intelligence officers from allied nations can bring their families to understand work they cannot discuss openly. Executive Director Chris Costa’s observation that U.S. intelligence culture prioritizes public transparency far more than Five Eyes partners traces directly to George Washington's decision to show taxpayers intelligence value, creating institutional differences that persist today.    This unique positioning allows the museum to collect international artifacts and host intelligence leaders in ways official government channels cannot, providing safe space for collaboration that strengthens partnerships without compromising operational security. Chris’ framework for discussing sensitive topics through historical analogs demonstrates sophisticated operational security while maintaining educational value.    Resources:  Annual Hidden Heroes fundraiser George Washington's Culper Spy Ring Operation Just Cause Berlin Tunnel Operation Operation Cyclone Project Azorian/Hughes Glomar   Topics Discussed: How George Washington's spy networks established American intelligence culture prioritizing public transparency over secrecy. The evolution of U.S. intelligence from wartime necessity to the formal establishment of the CIA in 1947. Why preventing strategic surprise drives intelligence operations, from Pearl Harbor through 9/11 to October 7th failures. Howard Hughes' submarine recovery operation using deep-sea exploration cover to retrieve Soviet nuclear weapons and provide suitable burial for enemy sailors. How the International Spy Museum serves as a neutral diplomatic space where intelligence services collaborate outside official channels. Using historical analogs to contextualize modern covert action discussions without compromising operational security. Why human intelligence remains essential in the AI era for penetrating leadership inner circles and understanding decision-making intent. Nuclear power as analogy for AI disruption, requiring guardrails and guidelines while leveraging capabilities without fearing the technology. How museum artifacts enable intelligence officers to share their life's work with families when operational security prevents direct discussion.

    41 min
  6. Trevor Hough on Counterterrorism's Away Game Problem

    05/11/2025

    Trevor Hough on Counterterrorism's Away Game Problem

    Former White House Official Trevor Hough’s career framework of accepting opportunities aligned with critical national security priorities rather than institutional advancement metrics paid off. Now, he has invaluable insights to share, including why large defense contractors excel at exquisite hardware like bombers and missiles but struggle with software requiring rapid iteration and flat organizational structures, and how classified intelligence sharing post-9/11 depended more on personal relationships across agency boundaries than formal bureaucratic processes.   His conversation with Ian also covers the strategic tension in counterterrorism between maintaining offensive pressure on networks abroad through special operations while securing domestic borders with conventional forces.    Resources:  Loonshots by Safi Bahcall   Topics Discussed: Why publicly traded defense contractors face structural barriers to rapid software iteration despite hardware excellence. The evolution from defensive homeland security posture to offensive counterterrorism operations targeting networks abroad after 9/11. Strategic resource allocation between special operations conducting offensive operations and conventional forces supporting domestic border security. How personality-based relationships enabled classified intelligence sharing when formal bureaucratic processes created operationally useless delays. Career development through mission-focused assignment selection rather than prescribed institutional advancement paths. How service-oriented emergency response patterns develop through various means, including military training, sports teams, and upbringing that emphasizes others first. The distinction between exquisite hardware requiring massive capital versus adaptive software benefiting from flat organizational structures.

    31 min
  7. Ret. RADM Terry Kraft on Aircraft Carriers Adapting to Future War

    22/10/2025

    Ret. RADM Terry Kraft on Aircraft Carriers Adapting to Future War

    When RADM Terry Kraft, USN (ret.), flew his first combat mission during Desert Storm, 20 years of Cold War training doctrine changed in a single night of anti-aircraft fire so dense "you could walk on it." His experience commanding the USS Ronald Reagan's maiden deployment and flying 40 combat missions gives insights into leadership adaptation under extreme pressure and the evolution of naval warfare tactics.   Now serving as President & CEO of The USS Midway Museum, Terry demonstrates how military leadership principles translate to civilian organizations, from managing 750 volunteers to preserving 80-year-old Naval hardware. His approach to command — built on direct access rather than hierarchical communication — offers practical frameworks for leaders managing large, distributed teams in high-stakes environments.   Resources: A-6E Intruder CNO Rapid Innovation Center Operation Desert Storm  Operation Valiant Shield USS Midway Museum USS Enterprise  USS Ronald Reagan   Topics Discussed: How Desert Storm combat experience forced immediate abandonment of Cold War low-altitude attack doctrine when anti-aircraft artillery proved more dangerous than sophisticated missile systems. The leadership philosophy of providing direct access to command through post-meeting question sessions and ship-produced television programming to connect with 5,000-person crews. Why aircraft carriers remain relevant as adaptable platforms for future warfare technologies. The CNO Rapid Innovation Center's approach to fleet innovation to drive deck-plate solutions and identify bureaucratic barriers. Emissions control operations that prepared carrier groups for great-power competition by operating without radar or comms. The institutional challenge of defense technology adoption, where the average new system is older than the sailors using it, and strategies for innovation despite 18-year procurement cycles. Maintaining operational leadership credibility through technical proficiency and regular engagement with frontline operations. How naval traditions like crossing-the-line ceremonies maintain unit cohesion and shared identity across technological generations. The strategic value of aircraft carriers hosting international military leaders as tools for demonstrating freedom of navigation principles. Museum leadership lessons from transitioning military command experience to civilian volunteer management.

    39 min
  8. Ret. Vice Admiral Bob Sharp on Why Intelligence Without Planning is Just Trivia

    08/10/2025

    Ret. Vice Admiral Bob Sharp on Why Intelligence Without Planning is Just Trivia

    Ret. Vice Admiral Bob Sharp's journey from Desert Storm to NGA Director showcases how foundational experiences can shape decades of strategic thinking. His framework for intelligence-operations integration, where intelligence without operations is just trivia, and operations without intelligence is dangerous, emerged from witnessing combat operations during the Gulf War.   Bob also shares his leadership scaling method that involves daily "walkabouts" where he tries to make at least one person feel special on the team every day, maintaining personal connection even across 15,000 employees. His "you can't surge trust" philosophy emphasizes genuine consistency and demonstrable care over time.    Resources & Events Mentioned:  Desert Storm National Geospatial Intelligence Agency (NGA) Office of Naval Intelligence (ONI) Special Operations Command (SOCOM) Information Warfare Community   Topics Discussed: Scaling leadership from targeting officer to directing 15,000-person geographically dispersed intelligence organizations through daily walkabouts to maintain connectedness. Special Operations Force truths: you can't surge trust. You must build it through genuine consistency and care. Intelligence without operations is trivia, operations without intelligence is dangerous. Revolutionary vs evolutionary strategic environment: return to great power competition vs disruptive quantum and AI technologies. Four-pillars of intelligence investment strategy: assured PNT, machine-partnered workflows, collection orchestration, and strategic data processing. Demystifying the intelligence profession by explaining engineering and technology behind collection to create integrated operational teams. Information Warfare Community transition from support function to unrestricted line designation and acquisition leadership roles.

    39 min

Sobre

Welcome to Defense Disrupted, a podcast exploring how technology is transforming the future of defense operations. As the CEO of TurbineOne, I’m excited to bring together defense leaders, innovators, and practitioners who are leveraging cutting-edge solutions on the frontlines. Through conversations with military professionals, technology experts, and implementation specialists, we’ll explore practical insights about deploying machine learning at the edge, emerging trends in field operations, and success stories from those accelerating threat recognition. Thank you for joining us as we explore the intersection of technology and national security!