• Episode 31 - The Math Behind Military Precision: Modeling Kill Chains Probabilistically
    Nov 12 2024

    In this episode, we dive into the complex and fascinating world of military operations research with a focus on kill chains, a critical concept in modern warfare. Our episode, inspired by the paper Modeling Kill Chains Probabilistically by William J. Farrell III and Dean Wilkening, unpacks how mathematics and probability theory can help improve military precision and decision-making.

    Kill chains refer to the steps taken to locate, track, and engage targets, typically in air-to-surface strikes. Traditionally, analysts used fixed timelines for each step, but real-world operations rarely follow such predictable patterns. This is where the authors introduce a probabilistic approach, using mathematical tools like the Saddlepoint Approximation (SPA) to better model each kill chain step as a random variable. By doing so, they can account for unpredictable factors—human decision times, sensor delays, and target movement—giving military planners a clearer picture of the likelihood of completing each mission step in time.

    Throughout the episode, we'll break down key probabilistic methods used in the paper, including Moment Generating Functions (MGFs) and how they help model the "find, fix, track, target, engage" steps with varying levels of certainty. We’ll also discuss why this probabilistic approach offers a significant advantage over older, deterministic models, providing military operations with greater flexibility and accuracy in unpredictable environments.

    Whether you're interested in mathematics, military strategy, or data science applications, this episode will give you a behind-the-scenes look at how cutting-edge research is pushing the limits of operational planning and tactical decision-making.


    Show More Show Less
    19 mins
  • Episode 30 - Building the Network Security CIP: Inside Our Common Operating Picture and the Algorithms Driving It
    Nov 11 2024

    In this episode, we take a deep dive into the creation of our groundbreaking network security Common Operating Picture (COP). This application functions as a Common Intelligence Picture(CIP) tool, designed to provide an all-encompassing view of network infrastructure security. We’ll explore how our interactive dashboard allows users to manage network devices, visualize connections, and assess risk, all while leveraging advanced algorithms. From Weighted Moving Averages to State Transition Models, we'll explain the cutting-edge formulas that power our risk scoring, anomaly detection, and predictive capabilities. Tune in to learn how we brought together network visualization, device management, and security analytics to build a powerful, modular platform that transforms network defense.


    Show More Show Less
    16 mins
  • Episode 29 - Defending the Homeland: Cyberspace Operations and Critical Infrastructure
    Oct 16 2024

    In this episode, we explore Chapter 5 of the Strategic Cyberspace Operations Guide, which delves into the complexities of defending the U.S. homeland from cyber threats. Cyberspace is a critical domain for national security, and the Department of Defense (DoD) plays a pivotal role in protecting the nation’s infrastructure alongside other federal agencies and private-sector partners.


    Key topics include:


    • The Department of Defense’s missions in homeland defense and its role in Defense Support of Civil Authorities (DSCA) during emergencies, working closely with DHS and other civil agencies.

    • The importance of protecting the nation’s 16 critical infrastructure sectors, ranging from energy to communications, which are vital to national security, economic stability, and public health.

    • The role of the Defense Industrial Base (DIB) in national defense and how the DoD collaborates with private companies to secure key resources and mitigate cyber threats through information sharing and resilience efforts.

    • How USCYBERCOM and other combatant commands coordinate and execute cyberspace operations to defend the homeland against sophisticated adversaries, and the challenges they face in maintaining command and control across diverse sectors and agencies.

    • The concept of “defending forward” in cyberspace operations, which involves preemptive actions to stop cyber threats before they reach critical infrastructure, ensuring that potential attacks are detected and neutralized at the earliest stage.

    • How the Cyber National Mission Force (CNMF) and other DoD cyber teams work with civilian agencies, including DHS and DOJ, to investigate, deter, and respond to cyberattacks on the nation’s critical infrastructure.


    Join us as we examine how the U.S. military, government agencies, and private sector come together to protect the homeland from cyber threats and ensure the resilience of the nation’s critical infrastructure.

    Show More Show Less
    9 mins
  • Episode 28 - Executing in the Digital Domain: Cyberspace Operations in Action
    Oct 16 2024

    n this episode, we explore Chapter 4 of the Strategic Cyberspace Operations Guide, which focuses on the critical phase of executing military operations in cyberspace. Cyberspace is a dynamic and contested domain, requiring precise planning, coordination, and adaptation as operations unfold.

    Key topics include:

    • The role of the Execute Order (EXORD) in initiating cyberspace operations and how planning continues during execution to adjust and react to new challenges in real-time.

    • Unique considerations for cyberspace operations compared to traditional domains, such as understanding the physical, logical, and cyber-persona layers of targets and the unpredictability of higher-order effects.

    • How command and control (C2) structures are adapted to synchronize cyberspace operations at both the global and theater levels, ensuring unity of effort among USCYBERCOM, combatant commands, and other stakeholders.

    • The complexities of cyberspace targeting, where operations must consider multiple layers of a target, and the importance of intelligence in gaining access to critical adversary networks.

    • The legal and policy frameworks that govern cyberspace operations, and the specific rules of engagement (ROE) that determine the scope of actions in different parts of cyberspace.

    • The critical role of synchronization and deconfliction to ensure that multiple cyberspace actions do not conflict with one another, especially when integrated with electronic warfare and other military operations.

    • Challenges in assessing the impact of cyberspace operations, given that effects are not always immediately visible, requiring complex intelligence and battle damage assessments (BDA).

    Join us as we unpack the intricacies of executing successful cyberspace operations and how the military navigates the digital domain in defense of national security.

    Show More Show Less
    10 mins
  • Episode 27 - Mastering the Cyber Battlefield: Strategic Planning for Cyberspace Operations
    Oct 16 2024

    In this episode, we explore Chapter 3 of the Strategic Cyberspace Operations Guide, which focuses on the intricacies of planning and executing cyberspace operations. As the digital landscape becomes increasingly critical to military strategy, effective planning in cyberspace is essential for maintaining operational superiority.


    We delve into the Joint Planning Process (JPP) and how it helps commanders integrate cyberspace operations into broader military campaigns

    Show More Show Less
    12 mins
  • Episode 26 - Commanding the Digital Battlefield: Air Force Cyberspace Operations
    Oct 16 2024

    In this episode, we take a deep dive into Chapter 2 of the Air Force Doctrine Publication 3-12 for Cyberspace Operations, which covers the organization, roles, and responsibilities of the Air Force’s cyberspace forces.


    We explore how cyberspace operations are structured under USCYBERCOM, focusing on the different roles played by the Cyberspace Mission Forces (CMF). From Cyber Protection Teams (CPTs) tasked with defending vital military networks, to the Cyber National Mission Force (CNMF) that protects against significant cyber threats to national security, we discuss how the Air Force organizes and deploys these forces to secure the digital battlefield.

    Show More Show Less
    11 mins
  • Episode 25- Defending the Digital Domain: Air Force Cyberspace Operations
    Oct 16 2024

    In this episode, we delve into the Air Force Doctrine Publication 3-12, which outlines the critical role of cyberspace operations in modern military strategy. As cyberspace has become a contested domain, the Air Force recognizes it as vital for achieving and maintaining operational and strategic advantages over adversaries.


    We will explore how the Air Force employs Offensive Cyberspace Operations (OCO) to project power in cyberspace, Defensive Cyberspace Operations (DCO) to protect critical systems, and DODIN Operations to secure the vast military networks vital for mission success.

    Show More Show Less
    23 mins
  • Episode 24 - Beyond Oil: Why Data is the New Ammunition in Information Warfare
    Oct 16 2024

    In this episode, we explore the provocative idea that data is the new ammunition, as discussed in the article “Data as Ammunition – A New Framework for Information Warfare.” The authors argue that the commonly used analogy of “data as oil” falls short of capturing the real dangers and implications of data in modern military and cybersecurity contexts. Instead, they propose thinking of data as ammunition, emphasizing its dual potential for both constructive and destructive uses, particularly when weaponized through analytics.

    Show More Show Less
    12 mins