Welcome to the Battle Test, your go-to podcast for in-depth discussions on Test and Evaluation (T&E), cybersecurity, and the evolving world of offensive and defensive cyber warfare. We dive into the strategies, technologies, and innovations shaping the future of defense, with expert insights on how T&E ensures military systems are battle-ready and how cyber tactics are redefining modern warfare. Join us as we break down complex defense topics and explore the critical role of cybersecurity in protecting national interests on the digital battlefield.
Welcome to a unique storytelling experiment. What you're about to hear wasn't written in the traditional sense. It was generated entirely by SAM—the Small Agent Model—an AI trained on technical documents, research papers, and patterns pulled from a vast archive of open-access knowledge, including thousands of PDFs from arXiv.org. This story began with a single prompt and evolved entirely within SAM’s internal reasoning. No plot out...
In this episode, we unpack a cutting-edge approach to building lean, high-performance AI models tailored for cybersecurity. Based on our latest white paper, we explore a multi-stage knowledge distillation pipeline that transfers expertise from large teacher models to smaller, more efficient student models like Phi-3 Mini. Topics include structured data enrichment, virtual machine-based learning, test-time reinforcement learning (TT...
The paper titled "MCP Safety Audit: LLMs with the Model Context Protocol Allow Major Security Exploits" by Brandon Radosevich and John Halloran investigates security vulnerabilities introduced by the Model Context Protocol (MCP), an open standard designed to streamline integration between large language models (LLMs), data sources, and agentic tools. While MCP aims to facilitate seamless AI workflows, the authors identify signific...
In this episode, we explore how modern cybersecurity is transforming with agentless threat emulation. We discuss a cutting-edge platform that simulates advanced persistent threat (APT) tactics without installing agents—leveraging open-source tools like Atomic Red Team and PurpleSharp alongside the MITRE ATT&CK framework. Discover how the platform’s user-friendly, drag-and-drop scenario builder, remote execution via SSH/WinRM, a...
This NIST report offers a comprehensive exploration of adversarial machine learning (AML), detailing threats against both predictive AI (PredAI) and generative AI (GenAI) systems. It presents a structured taxonomy and terminology of various attacks, categorising them by the AI system properties they target, such as availability, integrity, and privacy, with an additional category for GenAI focusing on misuse enablement. The documen...
In this episode, we delve into a newly published white paper that outlines a cutting-edge pipeline for enhancing language models through knowledge distillation and post-hoc mechanistic interpretability analysis. We explore how the approach integrates data enrichment, teacher pair generation, parameter-efficient fine-tuning, and a self-study loop to specialize a base language model—particularly for cybersecurity tasks—while preservi...
This research paper proposes a Cyber Common Operational Picture (CyCOP) framework for enhancing cyber situational awareness. The framework integrates various data streams to provide a comprehensive visual representation of cyber threats, enabling faster responses to attacks. The authors present five visualisations designed to meet specific needs in cyber defence, detailing their design and testing response times. The study's findin...
This article by Tyson Kackley details the development of a new wargaming system for the US Marine Corps, designed to support Force Design 2030. The system integrates multiple simulations across all warfighting domains, employing a modular, cloud-based architecture for scalability and adaptability. A key feature is its emphasis on data management and a continuous verification, validation, and accreditation (VV&A) process. This e...
In this episode of The Battle Test Podcast, we explore SENTINEL, a comprehensive strategy designed to transform privileged access management into a Zero Trust-aligned ecosystem. Leveraging proven open-source components like Keycloak, Shibboleth, and YubiKeys, along with cutting-edge innovations such as Zero-Knowledge Proofs (ZKPs), SENTINEL ensures robust security, operational continuity, and future-ready capabilities.
We discuss:
...In this episode of The Battle Test Podcast, we explore the strategic transformation of offensive cyberspace operations outlined in the Joint Cyber Weapons Architecture (JCWA) 2.0: Strategic Vision. This cutting-edge strategy shifts the focus from delivering standalone tools to deploying fully integrated cyber kill chains, designed to streamline operations and enhance mission effectiveness.
We delve into:
In this special holiday episode we’re taking a break from our usual deep dives into Test & Evaluation, Cybersecurity, and Government-related topics to spread some festive cheer—with a geeky twist!
Using the power of AI from Suno.com, we’ve reimagined classic Christmas songs into quirky holiday hits that explore zombies, artificial intelligence, and alien invasions. From the spooky fun of "Let Them Roam, Let Them Roam" to the fu...
In this episode, we dive into the complex and fascinating world of military operations research with a focus on kill chains, a critical concept in modern warfare. Our episode, inspired by the paper Modeling Kill Chains Probabilistically by William J. Farrell III and Dean Wilkening, unpacks how mathematics and probability theory can help improve military precision and decision-making.
Kill chains refer to the steps taken to locate, ...
In this episode, we take a deep dive into the creation of our groundbreaking network security Common Operating Picture (COP). This application functions as a Common Intelligence Picture(CIP) tool, designed to provide an all-encompassing view of network infrastructure security. We’ll explore how our interactive dashboard allows users to manage network devices, visualize connections, and assess risk, all while leveraging advanced alg...
In this episode, we explore Chapter 5 of the Strategic Cyberspace Operations Guide, which delves into the complexities of defending the U.S. homeland from cyber threats. Cyberspace is a critical domain for national security, and the Department of Defense (DoD) plays a pivotal role in protecting the nation’s infrastructure alongside other federal agencies and private-sector partners.
Key topics include:
• The Department of Defens...
n this episode, we explore Chapter 4 of the Strategic Cyberspace Operations Guide, which focuses on the critical phase of executing military operations in cyberspace. Cyberspace is a dynamic and contested domain, requiring precise planning, coordination, and adaptation as operations unfold.
Key topics include:
• The role of the Execute Order (EXORD) in initiating cyberspace operations and how planning continues during execution to...
In this episode, we explore Chapter 3 of the Strategic Cyberspace Operations Guide, which focuses on the intricacies of planning and executing cyberspace operations. As the digital landscape becomes increasingly critical to military strategy, effective planning in cyberspace is essential for maintaining operational superiority.
We delve into the Joint Planning Process (JPP) and how it helps commanders integrate cyberspace operatio...
In this episode, we take a deep dive into Chapter 2 of the Air Force Doctrine Publication 3-12 for Cyberspace Operations, which covers the organization, roles, and responsibilities of the Air Force’s cyberspace forces.
We explore how cyberspace operations are structured under USCYBERCOM, focusing on the different roles played by the Cyberspace Mission Forces (CMF). From Cyber Protection Teams (CPTs) tasked with defending vital mil...
In this episode, we delve into the Air Force Doctrine Publication 3-12, which outlines the critical role of cyberspace operations in modern military strategy. As cyberspace has become a contested domain, the Air Force recognizes it as vital for achieving and maintaining operational and strategic advantages over adversaries.
We will explore how the Air Force employs Offensive Cyberspace Operations (OCO) to project power in cyberspa...
In this episode, we explore the provocative idea that data is the new ammunition, as discussed in the article “Data as Ammunition – A New Framework for Information Warfare.” The authors argue that the commonly used analogy of “data as oil” falls short of capturing the real dangers and implications of data in modern military and cybersecurity contexts. Instead, they propose thinking of data as ammunition, emphasizing its dual potent...
In this episode, we explore the concept of analytic superiority in the age of big data and AI, drawing insights from the paper “The Importance of Analytic Superiority in a World of Big Data and AI.” We delve into how advanced analytics, machine learning (ML), and artificial intelligence (AI) are becoming critical enablers of military and strategic competition. Our discussion focuses on the framework of analytic superiority, which g...
If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.
Ding dong! Join your culture consultants, Matt Rogers and Bowen Yang, on an unforgettable journey into the beating heart of CULTURE. Alongside sizzling special guests, they GET INTO the hottest pop-culture moments of the day and the formative cultural experiences that turned them into Culturistas. Produced by the Big Money Players Network and iHeartRadio.
Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com
Paper Ghosts: The Texas Teen Murders takes you back to 1983, when two teenagers were found murdered, execution-style, on a quiet Texas hill. What followed was decades of rumors, false leads, and a case that law enforcement could never seem to close. Now, veteran investigative journalist M. William Phelps reopens the file — uncovering new witnesses, hidden evidence, and a shocking web of deaths that may all be connected. Over nine gripping episodes, Paper Ghosts: The Texas Teen Murders unravels a story 42 years in the making… and asks the question: who’s really been hiding the truth?
The World's Most Dangerous Morning Show, The Breakfast Club, With DJ Envy, Jess Hilarious, And Charlamagne Tha God!