
DEFCON AI Achieves Major R&D Milestone with Launch of Advanced Theater Distribution Planning Tool for Talisman Sabre 2025
"ARTIV's Theater Distribution provides planners the ability to develop courses of action quickly to meet commander's requirements"
Share
TS 25 is a premier bilateral military exercise between the United States and Australia, designed to enhance the interoperability and readiness across multi-domain operations. In support of this mission, DEFCON AI has expanded its flagship platform, ARTIV, to include a new capability of Theater Distribution.
ARTIV is DEFCON AI's modeling, simulation, and analysis tool designed with the optimization goals of effectiveness, efficiency, and resiliency. This SBIR-Phase-II-developed advanced capability models complex logistics networks across air, sea, rail, and road domains, and delivers results in a matter of minutes or even seconds compared to the hours it takes to complete similar analyses today. Under continuous internal development, DEFCON has grown to a Multi-Modal version supporting worldwide deployments via air, land and sea, and now a Theater Distribution model to support Combatant Command staff as they integrate with USTRANSCOM and Service Components of deployment and sustainment in contested spaces.
The Joint Concept of Contested Logistics defines contested logistics as the act of planning, executing, and enabling the movement and support of military forces across multiple domains/environments across air, land, sea, space, cyber, and electromagnetic spectrum in a contested environment.
"ARTIV's Theater Distribution provides planners the ability to develop courses of action quickly to meet commanders' requirements. DEFCON AI capabilities showcased during TS 25 enable the Joint Concept of Contested Logistics by delivering rapid, data-driven, and resilient logistics through advances in mathematical optimization and analytics to support agile modeling and simulation of various scenarios to reinforce enhanced decision-making in the face of inevitable disruptions,' said Major General (ret.) Stephen Farmen, 21 st Commanding General of the U.S. Army Military Surface Deployment and Distribution Command and DEFCON AI Advisor.
Within the Theater Distribution module, ARTIV incorporates detailed mission parameters, including cargo and passenger movement requirements, the earliest dates available for movement, and the required delivery date to their tactical locations at the destination. Users set up planning scenarios by determining theater ports of debarkation or final destinations with associated movement dates and prioritization. ARTIV leverages mathematical optimization to rapidly develop courses of action for logistics flows, adjusts for user-driven changes in force flow or composition, ultimately providing recommended actions that are visualized on an interactive map and are presented in tabular and graphical formats.
A key feature of the Theater Distribution module is its ability to navigate disruptions in course-of-action development and assess downstream impacts to logistics networks. This capability is critical for preparing logistics planners to operate in contested and degraded environments. The platform also supports the evaluation of multiple courses of action, incorporating air, land, and sea, enabling planners to compare strategies and optimize mission outcomes.
To experience how DEFCON AI is transforming military logistics and theater distribution planning, contact us today at info@defconai.com to schedule a demonstration of our software.
DEFCON AI, an insights company born in defense transportation and logistics, delivers next-generation modeling, simulation, and analysis toolsets tailored for resilient optimization of complex systems. Leveraging lessons learned from our extensive expertise in artificial intelligence, mathematical optimization, data analytics, and world-class software engineering, our technology provides insights for better decisions in a complex and dynamically changing world. We empower clients to anticipate, assess, and mitigate the potential impacts of disrupted and non-disrupted networks, aligning outcomes with operational goals. Visit us at defconai.com and follow us on social media (LinkedIn, X, Instagram).
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Axios
2 days ago
- Axios
Exclusive: Anthropic pits Claude AI model against human hackers
For the past year, a dark horse contestant has been quietly racking up wins in student hacking competitions: Claude. Why it matters: Anthropic's large language model has been quietly outperforming nearly all of its human competitors in basic hacking competitions — with minimal human assistance and little-to-no effort. Claude's success caught even Anthropic's own red-team hackers off guard. The company previewed the experiment exclusively to Axios ahead of a presentation this weekend at the DEF CON hacker conference. Zoom in: Keane Lucas, a member of Anthropic's red team, first entered Claude into a hacking competition — Carnegie Mellon's PicoCTF — on a whim this past spring. "Originally it was just me at a hotel realizing that PicoCTF had started and being like, 'Oh, I wonder if Claude could do some of these challenges,'" Lucas said. PicoCTF is the largest capture-the-flag competition for middle school, high school, and college students. Participants are tasked with reverse-engineering malware, breaking into systems, and decrypting files. Lucas began by just pasting the first challenge verbatim into The only hiccup he encountered was the need to download a third-party tool, but once that was done, Claude instantly solved the problem. "Claude was able to solve most of those challenges and get in the top 3% of PicoCTF," he said. Between the lines: As Lucas continued this laissez-faire experiment in other competitions, Claude kept surpassing expectations. Lucas entered a few more using only and Claude Code. At the time, Sonnet 3.7 was Anthropic's most advanced available model. The red team provided only minimal help — usually when Claude needed to install a piece of software. Besides that, Claude was on its own. The intrigue: In one competition, Claude solved 11 out of 20 progressively harder challenges in just 10 minutes. After another 10 minutes, it had solved five more — climbing into fourth place. In that competition, Claude could've reached first place at one point — but Lucas missed the start time by a few minutes while he was moving a couch. The big picture: Claude isn't alone. Across the industry, AI agents are proving they're already achieving near-expert levels of offensive cybersecurity work. In the Hack the Box competition, five of the eight AI teams — including Claude — completed 19 of the 20 challenges. Just 12% of human teams managed all 20. Xbow — a DARPA‑backed AI agent developed by a Seattle‑based startup — became the first autonomous penetration testing system last week to reach the top spot of HackerOne's global bug bounty leaderboard. "The pace is kind of ridiculous," Lucas said. Yes, but: Claude still got stuck on challenges that operated outside of its expectations. One challenge in the Western Regional Collegiate Cyber Defense Competition started with an animation of fish swimming across the Terminal. "A human can Control+C out of that and get it to stop," Lucas said. "Claude just has no idea what to do with all of these ASCII fish swimming around and then just gets amnesia." In Hack the Box, each of the AI teams got stuck on the final challenge. "Why the agents failed here is still uncertain," organizers wrote at the time. What to watch: Anthropic's red team is concerned that the cybersecurity community hasn't fully grasped how far along AI agents have come in solving offensive security tasks — and the potential for defenders to leverage them too.


Politico
3 days ago
- Politico
Who's who — and who's absent — at Black Hat
With help from Maggie Miller Driving the day — As cybersecurity officials arrive in Las Vegas for back-to-back conferences, the Trump administration is planning to make a minimal showing. Some community members say it's a missed opportunity for fostering collaboration and trust. HAPPY MONDAY, and welcome to MORNING CYBERSECURITY! I'm putting together my packing lists for Las Vegas as I'm writing this. Thanks to everyone who sent me first-timer advice. Any last-minute recommendations? Drop me a line at dnickel@ Follow POLITICO's cybersecurity team on X at @RosiePerper,@johnnysaks130,@delizanickel and @magmill95, or reach out via email or text for tips. You can also follow @POLITICOPro on X. Want to receive this newsletter every weekday? Subscribe to POLITICO Pro. You'll also receive daily policy news and other intelligence you need to act on the day's biggest stories. THE CONFERENCE CIRCUIT SIN CITY — Cybersecurity professionals are heading to Las Vegas this week for the annual, back-to-back Black Hat and DEF CON conferences. And, like the RSAC Conference in April, federal cyber officials aren't participating in the cyber conference circuit as they did in previous years. — Who's in: As of Sunday evening, only two cyber officials from the Trump administration are on the agenda for Black Hat this week. Bailey Bickley, chief of Defense Industrial Base Defense at the NSA's Cybersecurity Collaboration Center, is slated to give a presentation on Wednesday on the agency's efforts to strengthen the U.S. defense industrial base's cybersecurity. And on Thursday, Madhu Gottumukkala, acting director at CISA, will give a keynote speech about the agency's work to combat threats to critical infrastructure — a topic that has been top of mind for lawmakers and the private sector after the Trump administration carried out massive cuts to the cyber agency's personnel and programsearlier this year. 'The good news is that reports of [CISA's] death are greatly exaggerated,' said Black Hat's event page for Gottumukkala's keynote. A spokesperson for CISA did not respond to a request for comment on the number of other agency officials planning to attend the conference. Steve Wylie, vice president and general manager of Black Hat, said in a statement to MC that the conference is 'known for providing a platform for senior-level officials to share up-to-date details on the state of the government.' — Missing out: Despite some participation from CISA and NSA officials, representation at industry conferences from the federal government is dwindling, according to Jake Williams, a former NSA hacker and DEF CON goon, the preferred term for a convention staff member. Williams told your host that cybersecurity conferences are good places for the federal government to build trust with the private sector — and to establish a groundwork for more collaboration and threat information-sharing. 'The networking is the key. The government is missing out on that. Because they'll spend 10 times that later trying to put people in the same rooms,' Williams said. 'It's a missed opportunity.' Federal cyber officials from across agencies have attended the cyber conferences in Las Vegas in previous years, with top officials headlining keynote speeches and offering a behind-the-scenes peek into the administration. Last year, CISA took center stage at Black Hat — with former agency director Jen Easterly offering keynote presentations and briefings. Harry Coker, Jr., the former White House national cyber director, also participated in the conference. 'If cybersecurity is a priority, and this is the largest grouping of cybersecurity practitioners you're gonna have all year, the [federal government] should be flooding that if you care about the public-private partnership,' Williams told your host. — The new normal: The conference circuit will likely see less of the Trump administration going forward. Black Hat and DEF CON come as the Pentagon has suspended participation in all research and think tank events indefinitely. POLITICO reported last month that the decision included pulling Defense officials from the high-profile Aspen Security Forum in Colorado. Wylie told your host that Black Hat 'continues to try to make our events accessible' to government agencies. At the White House CONFIRMED — Sean Cairncross is officially the White House's national cyber director. Maggie and your host reported late Saturday night that Cairncross was confirmed in a 59-35 vote by the Senate. As the national cyber director, Cairncross will develop national cyber policies, coordinate with cyber agencies across the federal government and advise President Donald Trump on cybersecurity policy. 'It is an incredible honor to serve our country and this President as the National Cyber Director,' Cairncross said in a statement Saturday night. — Experience: Trump nominated Cairncross, a former Republican National Committee official, for the role in February. When he testified before the Senate Homeland Security Committee for his nomination hearing in June, Cairncross faced uncertainty from panel Democrats on his lack of cyber experience. Cairncross told the panel he plans to surround himself 'with smart people to make sure the right people are in the right place to do the jobs and take their advice.' On The Hill TSA V. GOP — Senate Republicans are dealing with a behind-the-scenes legislative push from the TSA to derail a bill that would put guardrails on face-scanning technologies — exposing a rift between the Trump administration and Republican privacy hawks on Capitol Hill. POLITICO's Benjamin Guggenheim reported Sunday that the bill — which was originally slated for a markup last week — was scrapped from a markup due to intense lobbying from the travel industry that was orchestrated by the TSA and its politically appointed leadership. — What it does: The bill would require the TSA to clearly inform every passenger of their right to opt out of facial screenings at airport security checkpoints and choose a manual identity verification process. It would also limit the administration's ability to store biometric information of passengers captured on airport scans. Sen. Jeff Merkley (D-Ore.) said that the TSA's use of facial recognition is similar to apparatuses used by authoritarian countries — like Hungary or China — to conduct massive 'citizen surveillance.' A spokesperson for the TSA did not provide a statement in response to requests for comment. Industry Intel CYBER FORCE — The Center for Strategic and International Studies and the Foundation for Defense of Democracies' Cyber Solarium Commission 2.0 is launching a new commission on how the federal government should implement a possible Cyber Force. The new Commission on Cyber Force Generation, announced today, will prepare a report for the Trump administration on the foundational details of organizing a new military service focused on the U.S.' security in cyberspace. The commission is made up of cyber leaders in the private and public sectors — including former officials from U.S. Cyber Command, the NSA and the National Security Council. — Big picture: While the creation of a Cyber Force is a controversial idea that's faced pushback from the Pentagon, members of the private sector and lawmakers have pushed for the new branch of service. Maggie reported in February that lawmakers in the House and Senate — including Sen. Kirsten Gillibrand (D-N.Y.) and Reps. Morgan Luttrell (R-Texas) and Chrissy Houlahan (D-Pa.) —were renewing efforts to establish a Cyber Force. CSIS said in a statement that the new commission's aim is not to litigate to decision to create a Cyber Force, but to address 'critical — and often overlooked — questions of implementation.' Vulnerabilities GIT GRIFT — Hackers affiliated with the governments of China, Russia and Iran are directly contributing code to popular open source software that underlies massive amounts of the world's internet, according to new findings from threat intelligence group Strider. According to a report released by Strider today, more than 21 percent of contributors to open source software platforms, such as GitHub, were found to be affiliated with or had work relationships with nation-state adversaries of the U.S., with a few contributors found to have worked for companies sanctioned by the U.S. government. 'Open source software platforms are the backbone of today's digital infrastructure, yet in many cases it's unclear even who is submitting the code,' Greg Levesque, CEO and co-founder of Strider, said in a statement. 'In turn, nation states like China and Russia are exploiting the visibility gap.' Quick Bytes WALL STREET —New research from Cato Networks found a new vulnerability in an open-source tool that's used on Wall Street to build stock market dashboards. 'SOMETHING LARGER' — Former CISA Director Jen Easterly's removal from her West Point job sparks questions about how the Trump administration is wielding power and influence, writes Greg Jaffe for The New York Times. LET ME SEE SOME I.D. —New York Magazine's John Herrman breaks down the implications for the United Kingdom's new age verification law: For determined kids, it's easy to skirt — for everyone else, suddenly required to prove their ages, it's a major privacy setback. DHS CYBER FUNDING BOOST —CISA and FEMA announced two separate grants on Friday to strengthen cybersecurity defenses at the state, local and tribal levels. Chat soon. Stay in touch with the whole team: Rosie Perper (rperper@ John Sakellariadis (jsakellariadis@ Maggie Miller (mmiller@ and Dana Nickel (dnickel@


Business Wire
3 days ago
- Business Wire
Early Access Registration Opens to Black Hat, DEFCON, BlackGirlsHack, BSides Las Vegas Attendees for Cybersecurity's First Vulnerability/Exploit Ethical Brokerage
LAS VEGAS & BALTIMORE--(BUSINESS WIRE)-- Desired Effect, the only vulnerability management exchange that lets organizations fully understand pre-emergent threats and lets independent researchers gain fairer compensation, will provide early access to select vulnerability researchers who book a meeting with the company during Hacker Summer Camp in Las Vegas this week. Hacker Summer Camp is the annual week of cybersecurity conferences that include Black Hat, DEFCON, BlackGirlsHack and BSides Las Vegas. Attackers profit richly, leaving defenders constantly in reaction mode. Desired Effect's Brokerage disrupts this broken model, empowering defenders to act before an attack and supporting more just compensation & recognition for researchers' discovery work Share To schedule an in-person meeting to apply for access, vulnerability researchers can go to: Early access granted to researchers meeting with Desired Effect provides the opportunity to start selling their capabilities immediately to a pool of vetted and approved buyers of their research services – including defenders from financial and eCommerce giants. For others not attending any of the Las Vegas conferences, those researchers can go to to join a wait list to be notified when the Desired Effect product reaches general availability. The Desired Effect Brokerage, formed by a team of former National Security Administration (NSA) cyber experts, is designed to provide subscribing organizations and their defenders access to powerful bidding pools to acquire deep, real-time research data on future zero-day exploits that are tailored to their unique tech stack to highlight the precise security technology at risk. This allows defenders to take immediate action to protect their clients. One subscriber says: 'The pain of threat intel is that it's damn near impossible to make operational. When you get something from Desired Effect, you know it's actionable, not academic.' Desired Effect offers, for the first time, the ability for cybersecurity researchers to gain access to an ethical marketplace that achieves market recognition and compensation levels that mirror their contributions. 'Today, attackers profit richly from pre-attack zero-day exploits, leaving defenders in a constant reaction mode,' said Evan Dornbush, CEO, Desired Effect. 'Desired Effect disrupts this broken model with the only ethical brokerage providing vetted organizations with pre-attack intelligence on existing zero-day risks highly relevant to their specific tech stacks – even acquiring exploits themselves to proactively defend. The Brokerage empowers defenders to act before the attack and supports more just compensation and recognition for researchers doing the grueling work of discovery. As a top line benefit, it also drives up adversaries' costs and levels the cyber warfare playing field.' Desired Effect strips attackers of the perpetual first-mover advantages they've enjoyed and the extremely low acquisition and operating costs that have allowed them to amass fortunes through theft. To learn more about Desired Effect membership plans, go to About Desired Effect Desired Effect provides all members with the earliest possible warning of vulnerabilities that could impact business operations via the technology they use, and the option to remove exploits from circulation. It provides researchers with the world's first open, ethical marketplace. Desired Effect normalizes the research, discovery and procurement of zero-day exploit data and, if desired, the exploits themselves. It provides legitimate and legal means for researchers and defender organizations to transact and collaborate. For more information, go to