Defense Disrupted

DefenseDisrupted

Welcome to Defense Disrupted, a podcast exploring how technology is transforming the future of defense operations. As the CEO of TurbineOne, I’m excited to bring together defense leaders, innovators, and practitioners who are leveraging cutting-edge solutions on the frontlines. Through conversations with military professionals, technology experts, and implementation specialists, we’ll explore practical insights about deploying machine learning at the edge, emerging trends in field operations, and success stories from those accelerating threat recognition. Thank you for joining us as we explore the intersection of technology and national security!

  1. TurbineOne’s Court Vanzant on Education, Discomfort, & Veteran Paths To Defense Entrepreneurship

    FEB 17

    TurbineOne’s Court Vanzant on Education, Discomfort, & Veteran Paths To Defense Entrepreneurship

    Court Vanzant, Chief Growth Officer at TurbineOne, offers a veteran entrepreneur framework that rejects the comfort trap: get a formal education to build hard skills, then deliberately seek discomfort as the growth indicator. His metric for knowing you're in the right space is sustained imposter syndrome: if you feel comfortable and competent, you've stopped learning.  For hardware startups, he challenges the VC orthodoxy on domestic manufacturing, arguing 40 years of offshoring created strategic vulnerabilities that demand US-based production despite higher costs. His counter-UAS market thesis targets $5 billion in military portables from the $35 billion global C-UAS budget. Topics Discussed: Why RF detection fails against fiber optic command wire and autonomous flight while radar cannot overcome terrain masking Addressing weaponized racing drones functioning as precision munitions against unprotected individual soldiers Capturing $5 billion military portables segment within $35 billion global counter-UAS market using US-first manufacturing approach Transitioning from consulting careers to defense startups through formal MBA education Applying Lean Six Sigma manufacturing principles from early career to current domestic hardware production strategy Challenging VC orthodoxy on hardware costs by arguing 40 years of offshoring created strategic vulnerabilities requiring US-based capacity Resources:  Lean Six Sigma Military Decision Making Process (MDMP) MilVet Veterans Business Outreach Centers (VBOC) Office of Small Business Programs: Veterans Resources The South Carolina Veterans Business Outreach Center (SC VBOC) The Honor Foundation DoW SkillBridge Best Online MBA Programs Military MBA: Best Value MBA Programs for Vets Using Post-9/11 GI Bill Upstate Warrior Solution North Carolina Veterans Business Association

    37 min
  2. JAN 27

    TurbineOne's Daniel Hebb on MOSA Compliance Failures & Tactical Workarounds

    Edge-deployed defense systems operate under different constraints than cloud infrastructure. Daniel Hebb, Engineering Manager at TurbineOne breaks down why you can't spin up additional compute instances: the entire optimization problem shifts from cost-per-transaction to maximum capability within fixed hardware limits. Daniel also touches on a critical gap in MOSA implementation where systems achieve specification compliance at the interface level while remaining operationally incompatible. Daniel showcases how he applies guitar signal chain processing concepts to build TurbineOne's pipeline architecture, enabling features that took engineers at other defense companies two years to ship. He signs up for the minimum MOSA requirement, then builds the complete capability anyway. When other contracted components fail, you demonstrate what's actually possible. The hardest defense technology problems don't get solved from desks; they require engineers willing to work contorted inside boat hulls with three-foot cables, no ladders, and trucks as improvised roof access. Resources:  Marine Corps Recruiting Depot Boot Camp Challenge (San Diego) Jocko Podcast The Creative Act by Rick Rubin Topics Discussed: Engineering edge-deployed AI systems under fixed hardware constraints where cloud computing scalability doesn't exist Exposing MOSA compliance failures where interface specifications achieve paper certification but platform security policies prevent actual data exchange Applying cross-domain engineering insights from guitar signal chain processing to frontline perception system pipeline architecture  Navigating misaligned architectural boundaries between military requirements and commercial tech company design approaches Implementing tactical workarounds by exceeding minimum MOSA requirements to demonstrate full capability when contracted components fail operationally Transition from big tech cloud environments to field-deployed defense systems requiring hands-on hardware debugging and integration Bridging cultural gaps between risk-averse defense acquisition processes and move-fast tech industry development methodologies

    30 min
  3. TurbineOne's Brandi Evans on Empowering PMs to Act Decisively and Course-Correct

    JAN 7

    TurbineOne's Brandi Evans on Empowering PMs to Act Decisively and Course-Correct

    SOCOM's acquisition speed advantage isn't about special authorities — they follow identical DOW policies as every one else. The difference is structural proximity and leadership empowerment. Brandi Evans, Director of SOCOM Enterprise at TurbineOne, also operates under a simple principle: there's nothing a PM can decide that can't be fixed within 48 hours. This calculated risk framework, paired with direct PEO access, enables the velocity SOCOM is known for.  Brandi was also among the second programs to transition under the software acquisition pathway, managing intelligence tools for all-source analysts while the government struggled to adopt commercial practices like PI planning and sprinting, putting them at least a decade behind industry. Her most pointed critique targets the requirements process itself: validation cycles stretching over a year demanding perfect documentation before programs start, when the real need is treating more capabilities as urgent operational requirements and moving to a project-based model rather than traditional programs of record. Topics Discussed: Clarifying SOCOM acquisition speed stems from structural proximity and leadership empowerment rather than special authorities Implementing a decision framework where program managers receive authority knowing leaders can reverse any decision within two days Adopting commercial software practices like PI planning and sprinting while the government remained behind industry standards Managing intelligence tools for all-source analysts through SOF Digital Applications requiring perpetual iteration rather than traditional completion milestones Utilizing OTAs and commercial solutions through innovation hubs to avoid lengthy source selection boards Reforming requirements validation processes that demand year-long perfect documentation before allowing programs to start  Leveraging field demonstrations and user feedback from trained operators to distinguish effective technology from vendor claims

    35 min
  4. Int’l Spy Museum's Chris Costa on Intel Partnerships as Diplomatic Safe Space

    12/09/2025

    Int’l Spy Museum's Chris Costa on Intel Partnerships as Diplomatic Safe Space

    It might be surprising, but The International Spy Museum is an important diplomatic tool, functioning as neutral ground where foreign intelligence officers from allied nations can bring their families to understand work they cannot discuss openly. Executive Director Chris Costa’s observation that U.S. intelligence culture prioritizes public transparency far more than Five Eyes partners traces directly to George Washington's decision to show taxpayers intelligence value, creating institutional differences that persist today.    This unique positioning allows the museum to collect international artifacts and host intelligence leaders in ways official government channels cannot, providing safe space for collaboration that strengthens partnerships without compromising operational security. Chris’ framework for discussing sensitive topics through historical analogs demonstrates sophisticated operational security while maintaining educational value.    Resources:  Annual Hidden Heroes fundraiser George Washington's Culper Spy Ring Operation Just Cause Berlin Tunnel Operation Operation Cyclone Project Azorian/Hughes Glomar   Topics Discussed: How George Washington's spy networks established American intelligence culture prioritizing public transparency over secrecy. The evolution of U.S. intelligence from wartime necessity to the formal establishment of the CIA in 1947. Why preventing strategic surprise drives intelligence operations, from Pearl Harbor through 9/11 to October 7th failures. Howard Hughes' submarine recovery operation using deep-sea exploration cover to retrieve Soviet nuclear weapons and provide suitable burial for enemy sailors. How the International Spy Museum serves as a neutral diplomatic space where intelligence services collaborate outside official channels. Using historical analogs to contextualize modern covert action discussions without compromising operational security. Why human intelligence remains essential in the AI era for penetrating leadership inner circles and understanding decision-making intent. Nuclear power as analogy for AI disruption, requiring guardrails and guidelines while leveraging capabilities without fearing the technology. How museum artifacts enable intelligence officers to share their life's work with families when operational security prevents direct discussion.

    41 min
  5. Trevor Hough on Counterterrorism's Away Game Problem

    11/05/2025

    Trevor Hough on Counterterrorism's Away Game Problem

    Former White House Official Trevor Hough’s career framework of accepting opportunities aligned with critical national security priorities rather than institutional advancement metrics paid off. Now, he has invaluable insights to share, including why large defense contractors excel at exquisite hardware like bombers and missiles but struggle with software requiring rapid iteration and flat organizational structures, and how classified intelligence sharing post-9/11 depended more on personal relationships across agency boundaries than formal bureaucratic processes.   His conversation with Ian also covers the strategic tension in counterterrorism between maintaining offensive pressure on networks abroad through special operations while securing domestic borders with conventional forces.    Resources:  Loonshots by Safi Bahcall   Topics Discussed: Why publicly traded defense contractors face structural barriers to rapid software iteration despite hardware excellence. The evolution from defensive homeland security posture to offensive counterterrorism operations targeting networks abroad after 9/11. Strategic resource allocation between special operations conducting offensive operations and conventional forces supporting domestic border security. How personality-based relationships enabled classified intelligence sharing when formal bureaucratic processes created operationally useless delays. Career development through mission-focused assignment selection rather than prescribed institutional advancement paths. How service-oriented emergency response patterns develop through various means, including military training, sports teams, and upbringing that emphasizes others first. The distinction between exquisite hardware requiring massive capital versus adaptive software benefiting from flat organizational structures.

    31 min
  6. Ret. RADM Terry Kraft on Aircraft Carriers Adapting to Future War

    10/22/2025

    Ret. RADM Terry Kraft on Aircraft Carriers Adapting to Future War

    When RADM Terry Kraft, USN (ret.), flew his first combat mission during Desert Storm, 20 years of Cold War training doctrine changed in a single night of anti-aircraft fire so dense "you could walk on it." His experience commanding the USS Ronald Reagan's maiden deployment and flying 40 combat missions gives insights into leadership adaptation under extreme pressure and the evolution of naval warfare tactics.   Now serving as President & CEO of The USS Midway Museum, Terry demonstrates how military leadership principles translate to civilian organizations, from managing 750 volunteers to preserving 80-year-old Naval hardware. His approach to command — built on direct access rather than hierarchical communication — offers practical frameworks for leaders managing large, distributed teams in high-stakes environments.   Resources: A-6E Intruder CNO Rapid Innovation Center Operation Desert Storm  Operation Valiant Shield USS Midway Museum USS Enterprise  USS Ronald Reagan   Topics Discussed: How Desert Storm combat experience forced immediate abandonment of Cold War low-altitude attack doctrine when anti-aircraft artillery proved more dangerous than sophisticated missile systems. The leadership philosophy of providing direct access to command through post-meeting question sessions and ship-produced television programming to connect with 5,000-person crews. Why aircraft carriers remain relevant as adaptable platforms for future warfare technologies. The CNO Rapid Innovation Center's approach to fleet innovation to drive deck-plate solutions and identify bureaucratic barriers. Emissions control operations that prepared carrier groups for great-power competition by operating without radar or comms. The institutional challenge of defense technology adoption, where the average new system is older than the sailors using it, and strategies for innovation despite 18-year procurement cycles. Maintaining operational leadership credibility through technical proficiency and regular engagement with frontline operations. How naval traditions like crossing-the-line ceremonies maintain unit cohesion and shared identity across technological generations. The strategic value of aircraft carriers hosting international military leaders as tools for demonstrating freedom of navigation principles. Museum leadership lessons from transitioning military command experience to civilian volunteer management.

    39 min
  7. Ret. Vice Admiral Bob Sharp on Why Intelligence Without Planning is Just Trivia

    10/08/2025

    Ret. Vice Admiral Bob Sharp on Why Intelligence Without Planning is Just Trivia

    Ret. Vice Admiral Bob Sharp's journey from Desert Storm to NGA Director showcases how foundational experiences can shape decades of strategic thinking. His framework for intelligence-operations integration, where intelligence without operations is just trivia, and operations without intelligence is dangerous, emerged from witnessing combat operations during the Gulf War.   Bob also shares his leadership scaling method that involves daily "walkabouts" where he tries to make at least one person feel special on the team every day, maintaining personal connection even across 15,000 employees. His "you can't surge trust" philosophy emphasizes genuine consistency and demonstrable care over time.    Resources & Events Mentioned:  Desert Storm National Geospatial Intelligence Agency (NGA) Office of Naval Intelligence (ONI) Special Operations Command (SOCOM) Information Warfare Community   Topics Discussed: Scaling leadership from targeting officer to directing 15,000-person geographically dispersed intelligence organizations through daily walkabouts to maintain connectedness. Special Operations Force truths: you can't surge trust. You must build it through genuine consistency and care. Intelligence without operations is trivia, operations without intelligence is dangerous. Revolutionary vs evolutionary strategic environment: return to great power competition vs disruptive quantum and AI technologies. Four-pillars of intelligence investment strategy: assured PNT, machine-partnered workflows, collection orchestration, and strategic data processing. Demystifying the intelligence profession by explaining engineering and technology behind collection to create integrated operational teams. Information Warfare Community transition from support function to unrestricted line designation and acquisition leadership roles.

    39 min
  8. CSET’s Emelia Probasco on How Military Risk Calculus Changes Under Operational Pressure

    09/24/2025

    CSET’s Emelia Probasco on How Military Risk Calculus Changes Under Operational Pressure

    Responsible AI requires understanding capabilities and limitations the same way officers learn that Aegis radar struggles on cloudy days. This mindset shift could change how the military adopts AI systems across operational environments.   Emelia Probasco, Senior Fellow at CSET, discusses how Project Maven succeeded by finding "trilingual leaders" who understood operations, technology, and contracting, not through formal training, but by figuring it out through curiosity and necessity. These leaders became the bridge between commercial tech companies and military operations, enabling rapid integration without traditional bureaucratic delays.   Resources:  Maven Smart System (MSS) Center for Security & Emerging Technology (CSET) Dr. Andrew Lohn & publications, including article on Offense-Defense Balance 1954 coup in Guatemala, caused by radio program Benedict Evans (Substack and other publications)  Jack Clark's substack (AI developments) DeepLearning.AI (Courses & specializations in AI)  The Great Refractor   Topics Discussed: Responsible AI as capabilities and limitations training similar to Aegis weapons systems certification requirements "Trilingual leaders" framework combining operations expertise, technology understanding, and contracting proficiency for AI integration Workflow software impact versus AI automation in achieving 20-person efficiency replacing 2,000-person operations Engineer-soldier co-location creating "mind meld" collaboration for honest operational feedback and requirements gathering Military cultural risk calculus shifts from peacetime safety to combat effectiveness under operational pressure China and Russia AI competition focused on adoption speed rather than frontier model development Deepfake warfare targeting specific military populations beyond general electoral manipulation tactics

    41 min

Ratings & Reviews

5
out of 5
10 Ratings

About

Welcome to Defense Disrupted, a podcast exploring how technology is transforming the future of defense operations. As the CEO of TurbineOne, I’m excited to bring together defense leaders, innovators, and practitioners who are leveraging cutting-edge solutions on the frontlines. Through conversations with military professionals, technology experts, and implementation specialists, we’ll explore practical insights about deploying machine learning at the edge, emerging trends in field operations, and success stories from those accelerating threat recognition. Thank you for joining us as we explore the intersection of technology and national security!