Defense Disrupted

DefenseDisrupted

Welcome to Defense Disrupted, a podcast exploring how technology is transforming the future of defense operations. As the CEO of TurbineOne, I’m excited to bring together defense leaders, innovators, and practitioners who are leveraging cutting-edge solutions on the frontlines. Through conversations with military professionals, technology experts, and implementation specialists, we’ll explore practical insights about deploying machine learning at the edge, emerging trends in field operations, and success stories from those accelerating threat recognition. Thank you for joining us as we explore the intersection of technology and national security!

  1. Keith Phillips on How Cold War STEM Infrastructure Drove Faster Tech Adoption Than Doctrine

    APR 23

    Keith Phillips on How Cold War STEM Infrastructure Drove Faster Tech Adoption Than Doctrine

    Keith C. Phillips, Major General (ret.), makes a sharp distinction: existential threat, not necessity, is what actually drives defense innovation. He uses Ukraine to prove it: Cold-War-era STEM depth, civil society capital, and 155mm expenditure rates not seen since World War II created conditions where speed wasn't a choice. He applies the same precision to the U.S. intel ecosystem; two customers, two outputs, and a collection-analysis-consumer pipeline where AI closes gaps at the interfaces between nodes, not inside them. On deterrence, his view is that whole-of-government no longer cuts it. The defense industrial base, academia, and private sector have to be in the equation. His read on how the U.S. typically gets there is that it’s only after taking a punch. Resources:  10th Special Forces Group Crimea conflict Elbit Systems IAI (Israel Aerospace Industries) Operation Protective Edge Topics Discussed: How infantry, Special Forces, and foreign area officer experience shapes assessment of modern conflict Why Ukraine's Cold-War-era STEM infrastructure and civil society funding enabled faster defense tech adoption than doctrine alone Contrasting air supremacy in Middle East operations against highly contested airspace in Ukraine and its effect on technology use How the U.S. intel ecosystem serves two distinct customers (combatant commanders and senior policymakers) with different intel outputs Where AI enters the collection-analysis-consumer pipeline: closing speed gaps at the interfaces between nodes, not replacing them Why deterrence now requires whole-of-nation mobilization across government, defense industrial base, academia, and private sector Frame U.S. defense priorities: defense against threats like counter-UAS, data from battlefield sensors, and the defense industrial base How the convergence of Silicon Valley and Washington is reshaping the relationship between commercial tech and national security

    33 min
  2. Marina Nitze on why emotional arguments don't move bureaucracies, and what actually does

    APR 10

    Marina Nitze on why emotional arguments don't move bureaucracies, and what actually does

    Every defense leader knows the feeling: the capability exists, the need is real, and the system won't move. Marina Nitze spent years inside the federal government — first as one of the original Presidential Innovation Fellows, then as Crisis Engineer & Partner at Layer Aleph — learning why that happens and, more importantly, how to break through it. Her new book, Crisis Engineering, out April 7, makes a case that cuts against most change management thinking: lasting transformation rarely comes from sustained pressure. It comes from a narrow window, and most organizations miss it entirely. Ian and Marina go deep on the mechanics of that window. She walks through the five conditions that signal a genuine crisis opening, explains why the organizations closest to the problem are usually the last to perceive it as one, and shares how a single veteran's story — trying and failing 12 times to enroll in VA healthcare — cracked a bureaucracy's false assumptions wide enough to let a simple fix through. She also draws a direct line between what she learned redesigning broken government processes and what defense and national security leaders are dealing with right now: units deploying in 48 hours, procurement timelines that can't match operational tempo, and the rare moments when the system is actually open to change. Topics Discussed: The five indicators of a genuine crisis window and why most organizations miss them Why the people closest to a broken system are often the last to perceive it as a crisis Changing the form itself rather than arguing with the person filling it out How a single veteran's story broke the VA's false narrative and opened a procurement window Using positive peer pressure across agencies to drive policy change without top-down mandates Why a 48-hour deployment timeline is one of the strongest crisis accelerants in defense Building cross-silo networks that include people far outside your immediate chain Reading the literal letter of a regulation to find compliant workarounds Why years of process-alignment over outcome-measurement created the conditions for today's government restructuring Disclaimer: The views expressed in this podcast are those of the hosts and guests and do not reflect the official policy or position of the Department of Defense, the U.S. Government, or any of its affiliated agencies.

    31 min
  3. Retired BG Ed Barker on Underwriting Risk So Acquisition Teams Will Move

    MAR 18

    Retired BG Ed Barker on Underwriting Risk So Acquisition Teams Will Move

    Ed Barker, Brigadier General (ret.), spent 34 years inside the Army acquisition system, including special operations units where mission failure wasn't an option and "no" was the beginning of the conversation, not the end. That environment forced him to know the rulebook well enough to seek waivers and reclamas through proper channels, and it shaped a career-long instinct for pushing acquisition teams past self-protection and toward what the warfighter actually needs, even when that meant telling senior leaders to stop active programs. Barker breaks down why OTA-enabled iteration (soldier feedback, live demonstrations, hands-on kit evaluation before any final buy decision) consistently outperformed major capability acquisition pathways locked to requirements documents seven or more years old. He explains how he underwrote risk personally to give teams the cover to move, and how Ukraine exposed programs that would not have survived contact Resources:  Carnegie Mellon AI courses Johns Hopkins AI courses National Reconnaissance Office (NRO) Topics Discussed: Navigating a 34-year Army career across enlisted artillery, infantry, military intelligence, and acquisition leadership roles Running special operations contracting where mission stakes demanded knowing the rulebook well enough to waive it Using OTAs and iterative soldier feedback loops to outperform legacy major capability acquisition pathways Challenging requirements documents and telling senior leaders to stop active programs mid-track Building acquisition cultures that treat waivers and reclamas as standard tools rather than last resorts Managing billion-dollar procurement decisions under conditions of organizational agility amid constantly shifting requirements and tech Assessing military AI education gaps and what separates leaders who apply it operationally from those who attend for optics Drawing lessons from Ukraine on survivability gaps in programs built to outdated requirements

    43 min
  4. Insight Partners’ Nick Sinai on People Flow, Procurement, and What Real Change Requires

    MAR 4

    Insight Partners’ Nick Sinai on People Flow, Procurement, and What Real Change Requires

    Nick Sinai, Managing Director at Insight Partners, spent nearly 6 years inside the Obama administration, helping stand up the Presidential Innovation Fellows program, and keeping notes on why high-profile tech talent from major firms kept failing to change government from the inside. His core observation from that period is that people consistently treated things as fixed constraints that were not actually fixed, and that misread is where most reform efforts die. Nick works through what change at scale inside defense institutions actually requires, including the old line that says if you are not fixing procurement or hiring, you are not fixing government. He and Ian get into how DoD has historically traded acquisition risk for operational risk, why that calculus is shifting now, and what "people flow" looks like as a deliberate insertion model rather than a one-time hire. Nick also addresses the false signal problem directly for defense tech entrepreneurs: SBIR funding and R&D contracts are not end-user validation, and the gap between the two is where companies stall.  Resources:  Hack Your Bureaucracy by Nick Sinai and Marina Nitze Presidential Innovation Fellows program U.S. Digital Service U.S. Digital Corps Harvard Kennedy School Qlab Insight Partners Topics Discussed: Writing Hack Your Bureaucracy to document why technologists succeed and fail driving change inside government institutions Using the Presidential Innovation Fellows program as a people flow model for inserting mid-career technical talent into federal agencies Why fixing procurement and hiring remain the only two structural levers for meaningful progress inside government at scale How DOD has historically traded acquisition risk for operational risk and why that posture is now shifting toward speed Applying an incremental insertion model versus a decapitation approach to reform inside large defense bureaucracies Distinguishing SBIR and R&D funding from genuine end-user validation and why false signal stalls defense tech companies Building customer bases across MODs and international partners to reduce single-buyer dependency on US government contracts Why the most defensible defense tech companies prioritize direct warfighter iteration over alignment with centralized program office requirements

    43 min
  5. TurbineOne’s Court Vanzant on Education, Discomfort, & Veteran Paths To Defense Entrepreneurship

    FEB 17

    TurbineOne’s Court Vanzant on Education, Discomfort, & Veteran Paths To Defense Entrepreneurship

    Court Vanzant, Chief Growth Officer at TurbineOne, offers a veteran entrepreneur framework that rejects the comfort trap: get a formal education to build hard skills, then deliberately seek discomfort as the growth indicator. His metric for knowing you're in the right space is sustained imposter syndrome: if you feel comfortable and competent, you've stopped learning.  For hardware startups, he challenges the VC orthodoxy on domestic manufacturing, arguing 40 years of offshoring created strategic vulnerabilities that demand US-based production despite higher costs. His counter-UAS market thesis targets $5 billion in military portables from the $35 billion global C-UAS budget. Topics Discussed: Why RF detection fails against fiber optic command wire and autonomous flight while radar cannot overcome terrain masking Addressing weaponized racing drones functioning as precision munitions against unprotected individual soldiers Capturing $5 billion military portables segment within $35 billion global counter-UAS market using US-first manufacturing approach Transitioning from consulting careers to defense startups through formal MBA education Applying Lean Six Sigma manufacturing principles from early career to current domestic hardware production strategy Challenging VC orthodoxy on hardware costs by arguing 40 years of offshoring created strategic vulnerabilities requiring US-based capacity Resources:  Lean Six Sigma Military Decision Making Process (MDMP) MilVet Veterans Business Outreach Centers (VBOC) Office of Small Business Programs: Veterans Resources The South Carolina Veterans Business Outreach Center (SC VBOC) The Honor Foundation DoW SkillBridge Best Online MBA Programs Military MBA: Best Value MBA Programs for Vets Using Post-9/11 GI Bill Upstate Warrior Solution North Carolina Veterans Business Association

    37 min
  6. TurbineOne's Daniel Hebb on MOSA Compliance Failures & Tactical Workarounds

    JAN 27

    TurbineOne's Daniel Hebb on MOSA Compliance Failures & Tactical Workarounds

    Edge-deployed defense systems operate under different constraints than cloud infrastructure. Daniel Hebb, Engineering Manager at TurbineOne breaks down why you can't spin up additional compute instances: the entire optimization problem shifts from cost-per-transaction to maximum capability within fixed hardware limits. Daniel also touches on a critical gap in MOSA implementation where systems achieve specification compliance at the interface level while remaining operationally incompatible. Daniel showcases how he applies guitar signal chain processing concepts to build TurbineOne's pipeline architecture, enabling features that took engineers at other defense companies two years to ship. He signs up for the minimum MOSA requirement, then builds the complete capability anyway. When other contracted components fail, you demonstrate what's actually possible. The hardest defense technology problems don't get solved from desks; they require engineers willing to work contorted inside boat hulls with three-foot cables, no ladders, and trucks as improvised roof access. Resources:  Marine Corps Recruiting Depot Boot Camp Challenge (San Diego) Jocko Podcast The Creative Act by Rick Rubin Topics Discussed: Engineering edge-deployed AI systems under fixed hardware constraints where cloud computing scalability doesn't exist Exposing MOSA compliance failures where interface specifications achieve paper certification but platform security policies prevent actual data exchange Applying cross-domain engineering insights from guitar signal chain processing to frontline perception system pipeline architecture  Navigating misaligned architectural boundaries between military requirements and commercial tech company design approaches Implementing tactical workarounds by exceeding minimum MOSA requirements to demonstrate full capability when contracted components fail operationally Transition from big tech cloud environments to field-deployed defense systems requiring hands-on hardware debugging and integration Bridging cultural gaps between risk-averse defense acquisition processes and move-fast tech industry development methodologies

    30 min
  7. TurbineOne's Brandi Evans on Empowering PMs to Act Decisively and Course-Correct

    JAN 7

    TurbineOne's Brandi Evans on Empowering PMs to Act Decisively and Course-Correct

    SOCOM's acquisition speed advantage isn't about special authorities — they follow identical DOW policies as every one else. The difference is structural proximity and leadership empowerment. Brandi Evans, Director of SOCOM Enterprise at TurbineOne, also operates under a simple principle: there's nothing a PM can decide that can't be fixed within 48 hours. This calculated risk framework, paired with direct PEO access, enables the velocity SOCOM is known for.  Brandi was also among the second programs to transition under the software acquisition pathway, managing intelligence tools for all-source analysts while the government struggled to adopt commercial practices like PI planning and sprinting, putting them at least a decade behind industry. Her most pointed critique targets the requirements process itself: validation cycles stretching over a year demanding perfect documentation before programs start, when the real need is treating more capabilities as urgent operational requirements and moving to a project-based model rather than traditional programs of record. Topics Discussed: Clarifying SOCOM acquisition speed stems from structural proximity and leadership empowerment rather than special authorities Implementing a decision framework where program managers receive authority knowing leaders can reverse any decision within two days Adopting commercial software practices like PI planning and sprinting while the government remained behind industry standards Managing intelligence tools for all-source analysts through SOF Digital Applications requiring perpetual iteration rather than traditional completion milestones Utilizing OTAs and commercial solutions through innovation hubs to avoid lengthy source selection boards Reforming requirements validation processes that demand year-long perfect documentation before allowing programs to start  Leveraging field demonstrations and user feedback from trained operators to distinguish effective technology from vendor claims

    35 min
  8. Int’l Spy Museum's Chris Costa on Intel Partnerships as Diplomatic Safe Space

    12/09/2025

    Int’l Spy Museum's Chris Costa on Intel Partnerships as Diplomatic Safe Space

    It might be surprising, but The International Spy Museum is an important diplomatic tool, functioning as neutral ground where foreign intelligence officers from allied nations can bring their families to understand work they cannot discuss openly. Executive Director Chris Costa’s observation that U.S. intelligence culture prioritizes public transparency far more than Five Eyes partners traces directly to George Washington's decision to show taxpayers intelligence value, creating institutional differences that persist today.    This unique positioning allows the museum to collect international artifacts and host intelligence leaders in ways official government channels cannot, providing safe space for collaboration that strengthens partnerships without compromising operational security. Chris’ framework for discussing sensitive topics through historical analogs demonstrates sophisticated operational security while maintaining educational value.    Resources:  Annual Hidden Heroes fundraiser George Washington's Culper Spy Ring Operation Just Cause Berlin Tunnel Operation Operation Cyclone Project Azorian/Hughes Glomar   Topics Discussed: How George Washington's spy networks established American intelligence culture prioritizing public transparency over secrecy. The evolution of U.S. intelligence from wartime necessity to the formal establishment of the CIA in 1947. Why preventing strategic surprise drives intelligence operations, from Pearl Harbor through 9/11 to October 7th failures. Howard Hughes' submarine recovery operation using deep-sea exploration cover to retrieve Soviet nuclear weapons and provide suitable burial for enemy sailors. How the International Spy Museum serves as a neutral diplomatic space where intelligence services collaborate outside official channels. Using historical analogs to contextualize modern covert action discussions without compromising operational security. Why human intelligence remains essential in the AI era for penetrating leadership inner circles and understanding decision-making intent. Nuclear power as analogy for AI disruption, requiring guardrails and guidelines while leveraging capabilities without fearing the technology. How museum artifacts enable intelligence officers to share their life's work with families when operational security prevents direct discussion.

    41 min

Ratings & Reviews

5
out of 5
11 Ratings

About

Welcome to Defense Disrupted, a podcast exploring how technology is transforming the future of defense operations. As the CEO of TurbineOne, I’m excited to bring together defense leaders, innovators, and practitioners who are leveraging cutting-edge solutions on the frontlines. Through conversations with military professionals, technology experts, and implementation specialists, we’ll explore practical insights about deploying machine learning at the edge, emerging trends in field operations, and success stories from those accelerating threat recognition. Thank you for joining us as we explore the intersection of technology and national security!

You Might Also Like