The Battle Test Podcast

By: Blue Cloak
  • Summary

  • Welcome to the Battle Test, your go-to podcast for in-depth discussions on Test and Evaluation (T&E), cybersecurity, and the evolving world of offensive and defensive cyber warfare. We dive into the strategies, technologies, and innovations shaping the future of defense, with expert insights on how T&E ensures military systems are battle-ready and how cyber tactics are redefining modern warfare. Join us as we break down complex defense topics and explore the critical role of cybersecurity in protecting national interests on the digital battlefield.
    Blue Cloak
    Show More Show Less
Episodes
  • Episode 31 - The Math Behind Military Precision: Modeling Kill Chains Probabilistically
    Nov 12 2024

    In this episode, we dive into the complex and fascinating world of military operations research with a focus on kill chains, a critical concept in modern warfare. Our episode, inspired by the paper Modeling Kill Chains Probabilistically by William J. Farrell III and Dean Wilkening, unpacks how mathematics and probability theory can help improve military precision and decision-making.

    Kill chains refer to the steps taken to locate, track, and engage targets, typically in air-to-surface strikes. Traditionally, analysts used fixed timelines for each step, but real-world operations rarely follow such predictable patterns. This is where the authors introduce a probabilistic approach, using mathematical tools like the Saddlepoint Approximation (SPA) to better model each kill chain step as a random variable. By doing so, they can account for unpredictable factors—human decision times, sensor delays, and target movement—giving military planners a clearer picture of the likelihood of completing each mission step in time.

    Throughout the episode, we'll break down key probabilistic methods used in the paper, including Moment Generating Functions (MGFs) and how they help model the "find, fix, track, target, engage" steps with varying levels of certainty. We’ll also discuss why this probabilistic approach offers a significant advantage over older, deterministic models, providing military operations with greater flexibility and accuracy in unpredictable environments.

    Whether you're interested in mathematics, military strategy, or data science applications, this episode will give you a behind-the-scenes look at how cutting-edge research is pushing the limits of operational planning and tactical decision-making.


    Show More Show Less
    19 mins
  • Episode 30 - Building the Network Security CIP: Inside Our Common Operating Picture and the Algorithms Driving It
    Nov 11 2024

    In this episode, we take a deep dive into the creation of our groundbreaking network security Common Operating Picture (COP). This application functions as a Common Intelligence Picture(CIP) tool, designed to provide an all-encompassing view of network infrastructure security. We’ll explore how our interactive dashboard allows users to manage network devices, visualize connections, and assess risk, all while leveraging advanced algorithms. From Weighted Moving Averages to State Transition Models, we'll explain the cutting-edge formulas that power our risk scoring, anomaly detection, and predictive capabilities. Tune in to learn how we brought together network visualization, device management, and security analytics to build a powerful, modular platform that transforms network defense.


    Show More Show Less
    16 mins
  • Episode 29 - Defending the Homeland: Cyberspace Operations and Critical Infrastructure
    Oct 16 2024

    In this episode, we explore Chapter 5 of the Strategic Cyberspace Operations Guide, which delves into the complexities of defending the U.S. homeland from cyber threats. Cyberspace is a critical domain for national security, and the Department of Defense (DoD) plays a pivotal role in protecting the nation’s infrastructure alongside other federal agencies and private-sector partners.


    Key topics include:


    • The Department of Defense’s missions in homeland defense and its role in Defense Support of Civil Authorities (DSCA) during emergencies, working closely with DHS and other civil agencies.

    • The importance of protecting the nation’s 16 critical infrastructure sectors, ranging from energy to communications, which are vital to national security, economic stability, and public health.

    • The role of the Defense Industrial Base (DIB) in national defense and how the DoD collaborates with private companies to secure key resources and mitigate cyber threats through information sharing and resilience efforts.

    • How USCYBERCOM and other combatant commands coordinate and execute cyberspace operations to defend the homeland against sophisticated adversaries, and the challenges they face in maintaining command and control across diverse sectors and agencies.

    • The concept of “defending forward” in cyberspace operations, which involves preemptive actions to stop cyber threats before they reach critical infrastructure, ensuring that potential attacks are detected and neutralized at the earliest stage.

    • How the Cyber National Mission Force (CNMF) and other DoD cyber teams work with civilian agencies, including DHS and DOJ, to investigate, deter, and respond to cyberattacks on the nation’s critical infrastructure.


    Join us as we examine how the U.S. military, government agencies, and private sector come together to protect the homeland from cyber threats and ensure the resilience of the nation’s critical infrastructure.

    Show More Show Less
    9 mins

What listeners say about The Battle Test Podcast

Average Customer Ratings

Reviews - Please select the tabs below to change the source of reviews.

In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.