
Phoenix Cast
A podcast about cybersecurity, technology and innovation issues in the military.
Latest episodes

Dec 30, 2022 • 55min
On Tactics, On Operations
In this episode of Phoenix Cast, hosts John and Kyle are joined by special guest Brett Friedman and the team talks about tactics, whether or not the operational level of war exists, and even a bit of force design.
Share your thoughts with us on Twitter: @USMC_TFPhoenix (Now verified!) Follow MARFORCYBER & MCCOG on Twitter, LinkedIn, Facebook, and YouTube. Leave your review on Apple Podcasts.
Links:
https://www.usni.org/press/books/tactics
https://www.usni.org/press/books/operations
https://www.amazon.com/American-Way-War-Military-Strategy/dp/025328029X
https://www.amazon.com/21st-Century-Ellis-Operational-Strategic/dp/1612518079/ref=sr_1_1?keywords=21st+century+ellis&qid=1671484665&s=books&sprefix=21st+century+ellis%2Cstripbooks%2C115&sr=1-1
https://press.armywarcollege.edu/cgi/viewcontent.cgi?article=1619&context=monographs

Dec 9, 2022 • 1h 3min
Return of Clausewitz
In this episode of Phoenix Cast, hosts John, Rich, and Kyle are re-joined by special guest Olivia Garard and they talk Clausewitz and the Defense.
Share your thoughts with us on Twitter: @USMC_TFPhoenix (Now verified!) Follow MARFORCYBER & MCCOG on Twitter, LinkedIn, Facebook, and YouTube. Leave your review on Apple Podcasts.
Links:
https://mwi.usma.edu/some-clausewitzian-thoughts-on-the-ukrainian-defense/

Dec 2, 2022 • 1h 19min
Multi-domain C2 operations
In this episode of Phoenix Cast, hosts John, Rich, and Kyle are joined by special guest Col Jeremy Winters, and they discuss all things Marine Air Control Group.
Share your thoughts with us on Twitter: @USMC_TFPhoenix (Now verified!) Follow MARFORCYBER & MCCOG on Twitter, LinkedIn, Facebook, and YouTube. Leave your review on Apple Podcasts.
Links:
https://www.youtube.com/watch?v=O9gTAjbiQEM&ab_channel=MarineCorpsRecruiting
https://www.amazon.com/Kill-Chain-Defending-America-High-Tech/dp/B086KQC2H2/
https://www.amazon.com/Limitless-Upgrade-Anything-Faster-Exceptional/dp/B086WPC14V/
https://www.amazon.com/Three-Dangerous-Men-Irregular-Warfare/dp/B095J93H5C/
https://www.amazon.com/Legacy-James-Kerr-audiobook/dp/B00FK500ZK/
https://www.themiloffice.com/

Nov 11, 2022 • 1h 13min
Mobile Forensics
In this episode of Phoenix Cast, hosts John and Kyle are joined by special guest Jessica Hyde, and they discuss all things Mobile Forensics.
Share your thoughts with us on Twitter: @USMC_TFPhoenix (Now verified!) Follow MARFORCYBER & MCCOG on Twitter, LinkedIn, Facebook, and YouTube. Leave your review on Apple Podcasts.
Links:
https://www.hexordia.com/
https://dfirdiva.com/
https://thisweekin4n6.com/
https://www.13cubed.com/
https://aboutdfir.com/a-beginners-guide-to-the-digital-forensics-discord-server/
https://cyberdefenders.org/blueteam-ctf-challenges/
https://www.youtube.com/c/DFIRScience
https://dfir.pubpub.org/pub/inkjsqrh/release/2
https://www.swgde.org/documents/published-complete-listing https://www.giac.org/podcasts/trust-me-im-certified/power-of-mind-over-matter-with-jessica-hyde/

Oct 31, 2022 • 54min
Digital Transformation, Software Dev and Factories, and VMware Tanzu
In this episode of Phoenix Cast, hosts John, Rich, and Kyle are joined by special guest Aaron Swain. They discuss what a Director of Digital Transformation does, software factories/software development, and the state of the software within the DoD.
Share your thoughts with us on Twitter: @USMC_TFPhoenix (Now verified!) Follow MARFORCYBER & MCCOG on Twitter, LinkedIn, Facebook, and YouTube. Leave your review on Apple Podcasts.

Oct 11, 2022 • 55min
Exchange Vuln and Meetings
In this episode of Phoenix Cast, hosts John, Rich, and Kyle discuss an exchange vulnerability and some thoughts on meetings - when to have them, what we need to fix, and even a tie into doctrine and planning.
Share your thoughts with us on Twitter: @USMC_TFPhoenix (Now verified!) Follow MARFORCYBER & MCCOG on Twitter, LinkedIn, Facebook, and YouTube. Leave your review on Apple Podcasts.
Links:
Exchange vuln: https://www.bleepingcomputer.com/news/microsoft/microsoft-confirms-new-exchange-zero-days-are-used-in-attacks/
Adam Grant (tweet):
https://twitter.com/adammgrant/status/1575919115621249025?s=46&t=3ssUn0PdP9nZeSGThMitSg
Bloomberg Article:
https://www.bloomberg.com/news/articles/2022-09-26/are-meetings-a-waste-of-time-pointless-plans-cost-big-companies-100m
Book:
The Geography of Thought: How Asians and Westerners Think Differently...and Why https://a.co/d/eaMtKZk

Sep 7, 2022 • 55min
BYOD for the Marine Corps?
In this episode of Phoenix Cast, hosts John and Kyle are joined by special guest Col Brian Russell and we discuss whether BYOD is the right thing for the Marine Corps.
Share your thoughts with us on Twitter: @USMC_TFPhoenix (Now verified!) Follow MARFORCYBER & MCCOG on Twitter, LinkedIn, Facebook, and YouTube. Leave your review on Apple Podcasts.
Links:
Fedscoop article on BYOD: https://www.fedscoop.com/army-to-kick-off-bring-your-own-device-byod-pilot-in-coming-weeks/
Brian’s article for the MCA: https://mca-marines.org/blog/2022/07/12/before-firing-a-shot-operations-in-the-information-environment-in-the-marine-corps/
NIST 800-207: https://csrc.nist.gov/publications/detail/sp/800-207/final
CrowdStrike’s Zero Trust overview: https://www.crowdstrike.com/cybersecurity-101/zero-trust-security/
Google BeyondCorp: https://cloud.google.com/beyondcorp
Okta’s BeyondCorp Website: https://beyondcorp.com

Sep 2, 2022 • 48min
Password Manager hack
In this episode of Phoenix Cast, hosts John and Kyle talk through a recent password manager hack, accessing air gapped data through LEDs, and NDAA language around vulnerabilities.
Share your thoughts with us on Twitter: @USMC_TFPhoenix (Now verified!) Follow MARFORCYBER & MCCOG on Twitter, LinkedIn, Facebook, and YouTube. Leave your review on Apple Podcasts.
Links:
Bloomberg article about LastPass:
https://www.bloomberg.com/news/articles/2022-08-25/the-world-s-most-popular-password-manager-says-it-was-hacked
Air gapped computers hacked through switch/network card LED lights:
https://www.bleepingcomputer.com/news/security/etherled-air-gapped-systems-leak-data-via-network-card-leds/?fbclid=IwAR0KzowuUfZ_V5yKfcuwEmhn7DrcsasMQf8YHCbrtj6FjqXOy14iecjXsq8
NDAA:
https://www.congress.gov/bill/117th-congress/house-bill/7900/text
Sect 6722

Aug 29, 2022 • 1h 24min
FD2030, RXR, and the role of Comm/Cyber/Intel
In this episode of Phoenix Cast, hosts John and Kyle are joined by special guest LtCol Scott Cuomo and the team talks about Force Design 2030, Recon/Counter-Recon, and what experience Scott has experimenting with the concepts, and his recommendations for Comm / Intel / and Cyber Marines.
Share your thoughts with us on Twitter: @USMC_TFPhoenix (Now verified!) Follow MARFORCYBER & MCCOG on Twitter, LinkedIn, Facebook, and YouTube. Leave your review on Apple Podcasts.
Links:
WoTR podcast with MGen Donovan:
https://warontherocks.com/2022/08/the-task-force-at-the-bleeding-edge-of-the-marine-corps/
Scott’s critique of Owen West’s article:
https://warontherocks.com/2022/07/on-the-ground-truth-and-force-design-2030-reconciliation-a-way-forward/
FD2030 articles:
https://mca-marines.org/wp-content/uploads/The-Case-for-Change.pdf
https://www.armyupress.army.mil/journals/military-review/online-exclusive/2021-ole/berger-future/
https://www.usni.org/magazines/proceedings/2022/april/stand-forces-adapt-or-perish
https://warontherocks.com/2020/05/getting-the-context-of-marine-corps-reform-right/
https://mca-marines.org/wp-content/uploads/Not-Yet-Openly-at-War-But-Still-Mostly-at-Peace.pdf

Aug 19, 2022 • 1h 5min
Strategic Advantage Depends on Cyber Vulnerabilities of Weapon Systems Article
In this episode of Phoenix Cast, hosts John and Kyle discuss an article about strategic advantage and how the authors of the article feel cyber contributes (or fails to contribute).
Share your thoughts with us on Twitter: @USMC_TFPhoenix (Now verified!) Follow MARFORCYBER & MCCOG on Twitter, LinkedIn, Facebook, and YouTube. Leave your review on Apple Podcasts.
Links:
Hill Article: https://thehill.com/opinion/cybersecurity/3591153-us-strategic-advantage-depends-upon-addressing-cybersecurity-vulnerabilities-of-weapon-systems/amp/