<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="/rss.xsl" type="text/xsl"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>ZeeTwii</title><description>A personal blog about my latest projects, thoughts, and other silly things</description><link>https://zeetwii.github.io</link><item><title>Life&apos;s Too Short for Frog DNA</title><link>https://zeetwii.github.io/posts/costplus_interviewmd</link><guid isPermaLink="true">https://zeetwii.github.io/posts/costplus_interviewmd</guid><description>A sitdown interview with the leader of Dinosaur technology within the Department of Defense.</description><pubDate>Fri, 18 Jul 2025 00:00:00 GMT</pubDate><content:encoded>&lt;h2&gt;&lt;strong&gt;&quot;Life&apos;s Too Short for Frog DNA&quot;: An Exclusive Interview with Rob &quot;The Boss&quot; Sivilli, CEO of Cost Plus Technologies&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Posted to the Cost Plus Technologies Unoffical Blog | Cleared for Public Release: Yes, Obviously | Distribution: Unlimited (Except to InGen)&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;em&gt;The following interview was conducted by Dr. James Nicholas Ashworth, D.Sc., Ph.D., Senior Distinguished Fellow of Computational Defense Epistemology, Emeritus Adjunct Chair of Applied Systems Irreversibility, and a man who has personally witnessed more PowerPoint briefings than any human being should reasonably survive. Dr. Ashworth sat down with Rob &quot;The Boss&quot; Sivilli, Founder, Chief Executive Officer, Chief Vision Officer, Chief Compliance Officer (self-certified), and Acting Director of Intersubjective Alignment at Cost Plus Technologies, to discuss the company&apos;s groundbreaking paleobiological defense portfolio, the competitive landscape, and why Mr. Sivilli has approximately zero respect for John Hammond.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. James Nicholas Ashworth, D.Sc.: Rob, thank you for making time. I understand your calendar is, to use the technical term, absolutely catastrophic.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Rob &quot;The Boss&quot; Sivilli:&lt;/strong&gt; Catastrophic is generous. Do you know how many contract modification requests I signed this morning? Neither do I — that&apos;s what the Director of Strategic Bureaucratic Optimization is for. But yes, I carved out forty-five minutes. I also billed it to a cost-plus line item, so technically the taxpayer is paying for this interview. You&apos;re welcome, America.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: Let&apos;s begin at the beginning. Cost Plus Technologies has made a significant push into the dinosaur-based defense solutions market. Walk me through the origin of that strategic decision.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; About three years ago, I was sitting in a Congressional hearing — as a witness, not a defendant, I want to be very clear about that — and a two-star general leans over to me and says, &lt;em&gt;&quot;Rob, what we really need is a heavy ground dominance platform that cannot be reasoned with, does not require a union contract, and will absolutely not unionize.&quot;&lt;/em&gt; And I said, &lt;em&gt;&quot;General, I have exactly one phone call to make.&quot;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;That call launched the &lt;strong&gt;ALLOSAUR Heavy Ground Dominance Platform&lt;/strong&gt;. Fourteen meters of validated lethality. Section 889 compliant. NDAA-friendly. Fully domestic — well, Cretaceous domestic, which our legal team assures us qualifies.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: As someone with a background in computer science, I find myself curious about the systems architecture underlying the genomic pipeline. But I suspect you&apos;re going to redirect me to the DNA sourcing question first.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; &lt;em&gt;(leaning forward)&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;You suspect correctly. And James — may I call you James? — as a fellow PhD, I know you appreciate precision. So let me be precise.&lt;/p&gt;
&lt;p&gt;Bird DNA. B-I-R-D.&lt;/p&gt;
&lt;p&gt;We use bird DNA. Specifically, a proprietary avian-sourced genomic baseline that our science team — God bless them, every one — has spent years refining. The ALLOSAUR is, taxonomically speaking, a very large bird. This is not a joke. This is a phylogenetic fact that we have weaponized. And before you ask: yes, we documented the ontology. It&apos;s in the data dictionary. You can have a copy if you&apos;re cleared.&lt;/p&gt;
&lt;p&gt;Now, I don&apos;t want to name names —&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: You&apos;re going to name names.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; I&apos;m going to name names. John Hammond. InGen Corporation. The man built a theme park — &lt;em&gt;a theme park&lt;/em&gt; — on Isla Nublar using &lt;em&gt;frog DNA&lt;/em&gt;. Frog. DNA. Do you know what frog DNA does to a genome sequence? It introduces sex-switching vulnerabilities into your population. Your entire dinosaur workforce becomes capable of spontaneous reproductive reorganization. That is not a feature. That is a catastrophic program management failure dressed up as &quot;chaos theory.&quot;&lt;/p&gt;
&lt;p&gt;We submitted a white paper on this to DARPA in 2019. They said it was &quot;outside current solicitation parameters.&quot; InGen failed to win a single DoD contract. I&apos;m just saying those two facts are related.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: To be fair — and I want to be fair, it&apos;s a professional obligation — InGen was primarily a commercial venture.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; &lt;em&gt;(long pause)&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;A &lt;em&gt;commercial&lt;/em&gt; venture. On a &lt;em&gt;classified island&lt;/em&gt;. With &lt;em&gt;classified animals&lt;/em&gt;. Funded by — and I looked into this — a combination of private investors and what my attorneys describe as &quot;aggressively ambiguous offshore entities.&quot; Meanwhile, we filed proper CAGE codes, registered in SAM.gov, and completed our CMMC Level 2 assessment before we sequenced a single strand of theropod genome. That&apos;s the difference between a professional defense contractor and a billionaire with a god complex and a helicopter.&lt;/p&gt;
&lt;p&gt;Also, his park had a 100% guest casualty rate on opening weekend. Our ALLOSAUR units have a &lt;em&gt;controlled&lt;/em&gt; casualty rate. It&apos;s in the spec.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: I&apos;ve spent enough time in acquisition to know that &quot;it&apos;s in the spec&quot; is doing enormous load-bearing work in that sentence. How do you respond to critics who suggest a 14-meter carnivorous theropod is a non-trivial liability risk?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; I respond by referring them to our &lt;strong&gt;Legal Disclaimers&lt;/strong&gt; page, which I think speaks for itself. We have indemnification language in that document that covers acts of God, acts of dinosaur, and at least three categories of event that don&apos;t have legal names yet.&lt;/p&gt;
&lt;p&gt;More substantively: the ALLOSAUR is a &lt;em&gt;managed system&lt;/em&gt;. It operates within defined engagement parameters. It has been behaviorally conditioned using a proprietary positive-reinforcement protocol that I cannot discuss in detail because it is covered under a CRADA with a major land-grant university and also because it involves a truly alarming amount of raw beef.&lt;/p&gt;
&lt;p&gt;InGen tried to manage their assets with &lt;em&gt;electric fences&lt;/em&gt;. We use a combination of operant conditioning, geofencing, and what our Chief Behavioral Systems Architect calls &quot;strategic caloric leverage.&quot; It&apos;s more humane, more effective, and — critically — it does not fail when someone cuts the power.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: Hammond has said, on the record, that he &quot;spared no expense.&quot; You&apos;ve described this characterization as, and I&apos;m quoting your internal Slack here, &quot;delusional.&quot;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; &lt;em&gt;(audible exhale)&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;He &lt;em&gt;spared every expense&lt;/em&gt;. The man had a park full of apex predators and his entire security architecture ran on a single workstation operated by a disgruntled employee with a Barbasol can. His IT security posture would not pass a basic RMF assessment. It would not pass a &lt;em&gt;conversation&lt;/em&gt; about a basic RMF assessment. James, you and I have both sat through ATO reviews. You know that what Hammond built would have been dead on arrival at the first ISSO meeting.&lt;/p&gt;
&lt;p&gt;We operate on a zero-trust architecture. Zero trust for the network. Zero trust for the endpoints. Zero trust for the dinosaurs, frankly — that&apos;s just good program management. Our ALLOSAUR units do not have access to the corporate VLAN. That is a design decision I am proud of.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: Speaking as someone who has watched DoD IT infrastructure decisions get made in real time — that is the correct decision. Now, what else is in the pipeline?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; I can speak obliquely and let the procurement community read between the lines, which is how we&apos;ve always done business — as you well know.&lt;/p&gt;
&lt;p&gt;We have an upcoming platform in the &lt;em&gt;aerial dominance&lt;/em&gt; space. Avian genomics again — &lt;em&gt;bird DNA&lt;/em&gt;, not frog, I cannot stress this enough — that addresses a capability gap in the low-altitude surveillance and interdiction domain. I will not confirm or deny whether it has feathers. I will confirm that it is Section 508 compliant, which I think demonstrates our commitment to inclusive design across all biological platforms.&lt;/p&gt;
&lt;p&gt;We are also exploring &lt;em&gt;aquatic&lt;/em&gt; options. I won&apos;t say more than that. I will say that InGen had the IP rights to a certain &lt;em&gt;marine-based platform&lt;/em&gt; and let them lapse. Their loss. Our CAGE code&apos;s gain.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: Final question, and I&apos;ll make it appropriately grandiose given the setting. What is the core message you want the defense acquisition community to take away from Cost Plus Technologies?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; We are the professionals. We file our paperwork. We use the correct DNA. We do not build theme parks and call them &lt;em&gt;research facilities&lt;/em&gt;. We do not rely on a single power grid to contain assets that can bite through a Ford Explorer.&lt;/p&gt;
&lt;p&gt;When you issue that next BAA — when you&apos;re staring at a capability gap that no conventional system can fill — we want you to think of us. We want you to think: &lt;em&gt;&quot;There&apos;s a company out there that took the Cretaceous seriously, that did the genomics right, that built a cost-plus contract structure so elegant it should be in a museum.&quot;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;And then we want you to call our Business Development team, who will be delighted to take your call between the hours of 10 AM and 3 PM, Monday through Thursday, excluding federal holidays and any day following a scheduled ALLOSAUR feeding.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: Rob, on behalf of the defense acquisition community, and as a fellow survivor of the federal IT enterprise, thank you.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; Charge it to the program.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;em&gt;Cost Plus Technologies is a registered defense contractor. The ALLOSAUR Heavy Ground Dominance Platform is currently in Limited User Testing. John Hammond was unavailable for comment. InGen Corporation did not respond to a request for comment, possibly because they no longer exist as a functioning entity. Dr. Ashworth&apos;s views are his own and do not represent the official position of any agency, department, command, or sentient apex predator. This interview has been edited for length, clarity, and OPSEC review.&lt;/em&gt;&lt;/p&gt;
</content:encoded><author>Nick Ashworth</author></item><item><title>The Frontal Lobe Is Not a Load-Bearing Structure</title><link>https://zeetwii.github.io/posts/cpt_interview_pterodactylmd</link><guid isPermaLink="true">https://zeetwii.github.io/posts/cpt_interview_pterodactylmd</guid><description>An Exclusive Interview with Rob &quot;The Boss&quot; Sivilli on the PTERODACTYL Incident and the Bite of 87</description><pubDate>Sat, 10 Jan 2026 00:00:00 GMT</pubDate><content:encoded>&lt;h2&gt;&lt;strong&gt;&quot;The Frontal Lobe Is Not a Load-Bearing Structure&quot;: An Exclusive Interview with Rob &quot;The Boss&quot; Sivilli on the PTERODACTYL Incident&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Posted to the Cost Plus Technologies Unoffical Blog | Cleared for Public Release: After Significant Legal Review | Distribution: Unlimited (Except to the JAG Office, Pending)&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;em&gt;Six months after our first interview, Cost Plus Technologies finds itself at the center of a controversy that has made the rounds in defense acquisition circles, three naval aviator group chats, and at least one Reddit thread that has since been removed for reasons the company declines to specify. Dr. James Nicholas Ashworth, D.Sc., returned to speak with Rob &quot;The Boss&quot; Sivilli about the deployment of the PTERODACTYL Counter-Unmanned Aerial System to CVN-87, the subsequent incident now being referred to in certain circles as &quot;The Bite of &apos;87,&quot; and what the company&apos;s path forward looks like. Mr. Sivilli requested that we note, for the record, that he is &quot;completely calm&quot; about all of this.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. James Nicholas Ashworth, D.Sc.: Rob. CVN-87. Walk me through it.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Rob &quot;The Boss&quot; Sivilli:&lt;/strong&gt; I want to start by saying that Petty Officer Fischbach is doing extremely well. He is responsive, he is communicative, and according to the ship&apos;s medical officer, he is living proof that the frontal lobe is, in the words of the official medical report, &quot;not a strictly load-bearing neurological structure.&quot; Those are the doctor&apos;s words. I&apos;m just repeating them.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: The sailor who was bitten.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; Who was &lt;em&gt;grazed.&lt;/em&gt; The after-action report uses the word &quot;grazed.&quot; We fought very hard for that word.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: The official NCIS report uses &quot;bite.&quot;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; The official NCIS report uses a lot of words. It also uses &quot;unauthorized engagement envelope exceedance,&quot; which I think more accurately captures what happened from a systems perspective. The PTERODACTYL unit was operating within its defined behavioral parameters — &lt;em&gt;we think&lt;/em&gt; — and Petty Officer Fischbach made a movement near the flight deck that the unit&apos;s threat-discrimination algorithm interpreted as, and I&apos;m going to use the technical term here, a drone.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: He was carrying a coffee mug.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; A very fast coffee mug. We are reviewing the sensor calibration.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: Let&apos;s back up. For readers who aren&apos;t familiar, describe the PTERODACTYL system.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; Absolutely. The &lt;strong&gt;PTERODACTYL Precision Threat Elimination and Rapid Organic Denial of Aerial Craft Technology with Ychromosomal Logic&lt;/strong&gt; — the acronym took three weeks and I stand behind it — is Cost Plus Technologies&apos; answer to the low-altitude UAS threat. It is a pterosaur-derived, avian-genomics-based counter-drone platform with a wingspan of approximately four meters, a top airspeed that we are contractually prohibited from disclosing, and a threat-interdiction methodology that I would describe as &quot;extremely thorough.&quot;&lt;/p&gt;
&lt;p&gt;It uses bird DNA. I cannot stress this enough. We are not InGen. We did not cut corners with amphibian genomics. Every PTERODACTYL unit was sequenced from a certified avian baseline, which means it is, taxonomically speaking, a very large, very fast, very motivated seabird with a beak the length of a regulation softball bat.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: And it was deployed to CVN-87 specifically.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; CVN-87, yes. The &lt;em&gt;USS Gerald R. Ford&lt;/em&gt;-class vessel currently under the command of Captain Jeremy Fitzgerald, who I want to say is an outstanding naval officer who has handled this entire situation with extraordinary professionalism, especially given his, let&apos;s call it, &lt;em&gt;personal history&lt;/em&gt; with bite-related incidents. The man is a survivor in every sense of the word. We have enormous respect for him.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: I&apos;m not going to ask about that.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; Appreciate it.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: The ship&apos;s designation — CVN-87. You didn&apos;t flag that as potentially inauspicious before deployment?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; &lt;em&gt;(long pause)&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Our Program Manager flagged it. In writing. There is a memo. I chose not to act on the memo, which in hindsight I acknowledge was a program management decision that did not age well. It is now a standing agenda item in our weekly risk review. We have a new policy: any contract involving the number 87 in the hull designation, contract vehicle number, or CLIN structure triggers an automatic safety review. We are calling it the Fitzgerald Protocol.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: How is Captain Fitzgerald responding to having a safety protocol named after him?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; He has not responded to our emails. His XO sent us a very terse one-sentence reply that I am advised not to quote in a public forum.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: Let&apos;s talk about Petty Officer Fischbach. How is he actually doing?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; Mark is doing great. Genuinely. He was remarkably composed during the incident — by all accounts he stood there for approximately twenty seconds with a completely blank expression, just processing what had happened, and then looked directly at the ship&apos;s camera system and said, and I am told this is an exact quote: &lt;em&gt;&quot;Was that the Bite of &apos;87?&quot;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Which, honestly, is a level of presence of mind under pressure that I find impressive. That man has a future in crisis communications if he ever leaves the Navy.&lt;/p&gt;
&lt;p&gt;We have also, at the company&apos;s expense, sent him a very nice fruit basket and a Kevlar flight deck helmet with enhanced cranial protection. The helmet is rated for pterosaur beak impact up to approximately forty miles per hour. The PTERODACTYL unit in question was traveling at approximately forty-three miles per hour at the moment of contact. We are working on the next revision.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: I feel obligated to ask: is the frontal lobe comment from the medical officer a real assessment, or is that some kind of legal positioning?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; It&apos;s real, it&apos;s in the report, and it is also — and I say this with tremendous gratitude — almost verbatim language from a DoD medical document that was used in a completely unrelated incident in 1987. I have cited it in our incident response. Our legal team called it &quot;an inspired use of precedent.&quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: InGen must be having a field day.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; &lt;em&gt;(visibly tightening)&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;InGen. Yes. We have been made aware that a representative of InGen&apos;s successor entity — I will not name them, they know who they are — sent a statement to two defense trade publications suggesting that this incident, quote, &quot;validates concerns about the use of unproven biological platforms in active fleet environments.&quot;&lt;/p&gt;
&lt;p&gt;This from a company whose flagship product ate a lawyer on its opening day. On a &lt;em&gt;toilet&lt;/em&gt;. Their entire liability record is one long argument against their own credibility, and they have the audacity to issue &lt;em&gt;statements&lt;/em&gt; about our quality assurance process. Their assets used frog DNA. Their assets could spontaneously reorganize their own reproductive biology. Our asset had a sensor calibration issue. These are not equivalent problems.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: To be scrupulously fair: their assets did not bite a sailor on a carrier.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; Their assets ate &lt;em&gt;guests&lt;/em&gt;. Paying guests. On a commercial property open to the public. We had one, single, documented beak-to-cranium contact event on a hardened military vessel in a controlled operational environment, and the sailor &lt;em&gt;survived with full cognitive function.&lt;/em&gt; I&apos;ll take that trade every time over whatever liability exposure comes with having a Velociraptor loose in a visitor center.&lt;/p&gt;
&lt;p&gt;Also — and I want this in the record — the PTERODACTYL successfully intercepted fourteen Group 2 UAS threats in the three days prior to the Fischbach incident. Fourteen. It has a 100% interdiction rate against actual targets. The Fischbach event represents a 6.7% friendly-contact rate against non-drone targets on the flight deck. In acquisition terms, that is well within acceptable system immaturity thresholds for a Milestone B program.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: I&apos;m confident no one has ever used those words in that order before in a Senate hearing.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; We have a hearing in six weeks. I have already used them in that order, in a draft opening statement, twice.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: Any modifications to the program going forward?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; Several. First, the threat-discrimination logic is being updated to deprioritize slow-moving, low-thermal-signature objects below a certain altitude threshold — we&apos;re calling this the &quot;coffee mug exclusion zone.&quot; Second, all flight deck personnel will be issued the aforementioned cranial protection. Third, we are looking at a behavioral conditioning update to better distinguish between a DJI Phantom 4 and a human being holding a beverage.&lt;/p&gt;
&lt;p&gt;We are also — and this is not officially announced — exploring a daytime restriction protocol for the PTERODACTYL units while the ship is at general quarters. We will limit their free-roaming mode to nighttime operations only, to prevent any further engagement envelope ambiguity. Our Chief Behavioral Systems Architect calls this the &quot;servo lockup prevention protocol.&quot; We call it &quot;not letting the pterosaur walk around the carrier in the daytime.&quot; It amounts to the same thing.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: That is essentially the exact lesson that Freddy Fazbear&apos;s Pizza learned in 1987.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; &lt;em&gt;(long silence)&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Yes. It is. And I want to be clear: we arrived at this independently, through rigorous after-action analysis, and not because a DoD IG investigator left a printout of a Wikipedia article on my desk with the relevant paragraph highlighted in yellow. That did not happen.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: Final question. What do you want the defense acquisition community to take away from this?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; That biological platforms in operationally contested environments require iterative refinement, and that iterative refinement sometimes involves a sailor named Mark and a very enthusiastic pterosaur. That is not a failure. That is the developmental process. Every transformative defense capability in history has had a Fischbach moment. We have learned from ours. We have documented our lessons learned, updated our TTP&apos;s, and submitted a contract modification request for the enhanced helmet program that I am confident will be approved, funded, and delivered before CVN-87 completes its current deployment.&lt;/p&gt;
&lt;p&gt;We are the professionals. We use bird DNA. We file our paperwork. And when our system bites a sailor, we send fruit.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Dr. Ashworth: Rob, thank you. And please pass along our best wishes to Petty Officer Fischbach.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sivilli:&lt;/strong&gt; He knows. He&apos;s been following the blog.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;em&gt;Cost Plus Technologies is a registered defense contractor. The PTERODACTYL CUAS platform is currently in a modified Limited User Testing phase pending sensor recalibration. Petty Officer Mark Fischbach has been medically cleared for full duty and has reportedly requested a transfer to a non-pterosaur-equipped vessel, which is under review. Captain Jeremy Fitzgerald declined to comment. The CVN-87 Fitzgerald Protocol has been submitted for formal inclusion in the Cost Plus Technologies Quality Management System. InGen&apos;s successor entity did not respond to a request for comment, which is statistically consistent with their pattern of behavior. Dr. Ashworth&apos;s views are his own. This interview has been edited for length, clarity, and ongoing NCIS coordination.&lt;/em&gt;&lt;/p&gt;
</content:encoded><author>Nick Ashworth</author></item><item><title>So you want to steal a model?</title><link>https://zeetwii.github.io/posts/so_you_want_to_steal_a_model</link><guid isPermaLink="true">https://zeetwii.github.io/posts/so_you_want_to_steal_a_model</guid><description>A breakdown of how much it costs and how difficult the most recent distillation attack against Anthropic was.</description><pubDate>Fri, 27 Feb 2026 00:00:00 GMT</pubDate><content:encoded>&lt;h2&gt;So you want to steal a model?&lt;/h2&gt;
&lt;p&gt;Early this week, Anthropic released a &lt;a href=&quot;https://www.anthropic.com/news/detecting-and-preventing-distillation-attacks&quot;&gt;report&lt;/a&gt; about the latest distillation attack they detected against there models.  While they don&apos;t explictly go over the cost of performing the attacks, it does bring to light a glaring error with how we currently think of both AI policy in the US, and what it means for LLM vendors as an industry.&lt;/p&gt;
&lt;h3&gt;Model Distillation&lt;/h3&gt;
&lt;p&gt;Before going further, let&apos;s define what we mean by distillation in this space.  Model distillation is the process by which you train a smaller model on the outputs of a larger model.  Do this repeatedly over a long enough time period, and eventually the smaller model will perform roughly as well as the larger model, without increasing in size.&lt;/p&gt;
&lt;p&gt;Where this transitions from a technique to an attack in Antrhopic&apos;s case is that both they, OpenAI, Google, and XAI, all keep their models private.  When you buy access to their models, their API, and most of their revenue stream is designed around keeping said model private and unable to be easily duplicated or recreated.  By asking a wide varity of questions that stimulate a wide variety of responses, you can train a smaller model on the outputs of the larger model, and eventually have a model that performs just as well as the larger model, without needing direct access to the larger model.  This is why Anthropic is calling it an attack, because it is a direct attack on their business model, and the way they make money.  If you can steal their model, then you don&apos;t need to pay them for access to it anymore.&lt;/p&gt;
&lt;p&gt;Distillation attacks do raise a weird truth about the current state of the LLM industry: so much of the value of these companies is in the data they have access to, and the models they have trained on that data.  If you can easily recreate the model, is there really any justification for the high evaulations many of these companies have?  All of our current policies and regulations are based on the idea that the models these companies have are unique and can&apos;t be easily replicated.  If that is not the case, then we need to rethink how we value these companies, and how we regulate them.&lt;/p&gt;
&lt;h3&gt;The Cost of Distillation&lt;/h3&gt;
&lt;p&gt;While Anthropic doesn&apos;t go into the cost of performing the attack, we can make some educated guesses based on the information they do provide.  While they don&apos;t list the exact interactions, they do provide how many interactions they flagged as being part of the attack, and how many interactions they had in total.  Based on this, we can estimate the cost of performing the attack, and how much it would cost to steal a model like Claude.&lt;/p&gt;
&lt;h4&gt;Cost Formula&lt;/h4&gt;
&lt;p&gt;Anthropic&apos;s API is priced based on the number of tokens you use.  So to try and estimate the cost, we need to figure out how many tokens were used in the attack.  However, Anthropic only provides the number of interactions, not the number of tokens.  To get around this, we have to estimate the number of tokens per interaction.  A quick google search shows the average number of tokens per conversation can vary widely, with 4,000 to 8,000 tokens being a common range.  Given that Anthropic lists over 24,000 accounts possibly being involved, we can assume the attackers were trying to make all the interactions look like normal conversations.  To make the math easier, we&apos;ll assume every interaction uses the high range of the estimate, 8,000 tokens.  This is probaly an overestimate, but it should give us a good upper bound on the cost of performing the attack.  With that in mind, we can use the following formula to estimate the cost of performing the attack:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Cost = (Number of Interactions) * (Tokens per Interaction) * (Cost per Token)
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Where:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Cost per Token: We&apos;ll use Anthropic&apos;s most expensive model, Opus 4.6, which has a cost of $25 per million tokens, or $0.000025 per token.&lt;/li&gt;
&lt;li&gt;Tokens per Interaction: As mentioned above, we&apos;ll use 8,000 tokens per interaction.&lt;/li&gt;
&lt;li&gt;Number of Interactions: Anthropic lists 16 million interactions in total that were flagged as part of the attack.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Using these numbers, we get a total cost of the attack to be: $3,200,000.  $3.2 million dollars is not a lot of money for a company or nation state to spend on stealing a model that could potentially be worth billions of dollars.  This is especially true when you consider that the cost of training a model like Claude from scratch would be in the hundreds of millions of dollars, if not more.&lt;/p&gt;
&lt;p&gt;In a weird way, this is actually a problem for Anthropic and other cloud based model vendors.  Even if they double the price of their API, the cost of performing the attack would still be so cheap that it would still be worth it for a company or nation state to steal the model.  In a weird way, the attacker is actually the best customer they will every have because there is no price they won&apos;t pay for API access.  This means they can&apos;t use the classic Steam approch of making it easier to buy the game than to steal it, because there is no price they can set that would discourage stealing the model and not also cause them to lose customers.&lt;/p&gt;
&lt;h5&gt;Indidual Breakdown&lt;/h5&gt;
&lt;p&gt;Antrhopic breaks down the total attack and lists several companies by name, so I thought it would be interesting to break down the cost of the attack for each company using the same formula as above.  This is not an exact science, as we don&apos;t know individual token usage or how many tokens were input vs output, but it should give us a good estimate of the cost of the attack for each company.  Here is the breakdown:&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Company Name&lt;/th&gt;
&lt;th&gt;Number of Interactions&lt;/th&gt;
&lt;th&gt;Estimated Cost of Attack&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;DeepSeek&lt;/td&gt;
&lt;td&gt;150,000&lt;/td&gt;
&lt;td&gt;$30,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Moonshot AI&lt;/td&gt;
&lt;td&gt;3,400,000&lt;/td&gt;
&lt;td&gt;$680,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;MiniMax&lt;/td&gt;
&lt;td&gt;13,000,000&lt;/td&gt;
&lt;td&gt;$2,600,000&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;The cost of performing a distillation attack against a model like Claude is shockingly low, especially when you consider the potential value of the model.  This raises some serious questions about the current state of the LLM industry, and how we value these companies.  If the models these companies have are not unique and can be easily replicated, then we need to rethink how we regulate them, and how we value them as companies.  Model vendors need to start thinking about how they can detect and prevent these types of attacks, which will require more heavily analysis and monitoring of their API usage, response patterns, and user behavior.  This is not an easy problem to solve, but it is one that needs to be addressed if these companies want to continue to be successful in the long term.&lt;/p&gt;
</content:encoded><author>Nick Ashworth</author></item><item><title>So you think you saw a drone?</title><link>https://zeetwii.github.io/posts/so_you_think_you_saw_a_drone</link><guid isPermaLink="true">https://zeetwii.github.io/posts/so_you_think_you_saw_a_drone</guid><description>A rundown of how and why most drone sightings are actually misidentified objects.</description><pubDate>Tue, 31 Mar 2026 00:00:00 GMT</pubDate><content:encoded>&lt;h2&gt;So you think you saw a drone?&lt;/h2&gt;
&lt;p&gt;A couple weeks ago, we started getting more news articles claiming drone sightings within CONUS (Continental United States) &lt;a href=&quot;https://abcnews.com/International/multiple-waves-unauthorized-drones-spotted-strategic-us-air/story?id=131245527&quot;&gt;military bases&lt;/a&gt;.  This has spawned a lot of panic and speculation about what these drones could be, who is flying them, and what their intentions are.  However, most of these sightings are likely misidentified objects rather than actual drones.  I&apos;ve done incident response to drone sightings for years, and I can tell you that the vast majority of these reports turn out to be false alarms.  In this post, I&apos;ll explain why most drone sightings are misidentifications and what you can do to avoid falling for the same trap.&lt;/p&gt;
&lt;h3&gt;It has lights, how hard can this be?&lt;/h3&gt;
&lt;p&gt;People tend to assume that if they see something with lights in the sky, it must be a drone.  However, especially in US airspace, there are many objects that can have lights and be mistaken for drones.  For example, airplanes, helicopters, weather balloons, satellites, and even stars all either have lights or illuminate and have all been mistaken for drones at some point.  People don&apos;t normally look up at the sky, and so when they do, they will often misinterpret what they see.  Figuring out how far away and how large an object is can be surprisingly difficult, especially at night.  A small drone flying close to you can look very similar to a large airplane flying far away.  This even extends to movements, people will often mistake a aircraft for drones because they misinterpret the movements of the object and assume it is hovering or moving too slowly to be anything else.&lt;/p&gt;
&lt;p&gt;There is a classic tell for these kinds of misidentifications, which is that the meme of standing there menacingly.  In the case reported by ABC news, the witnesses are claiming that a swarm of drones have repeatedly violated US military airspace for the sole purpose of hovering with their lights on while base security panics.  This is not how actual drone attacks work, and not something any threat actor would do.  Drones are generally used for either surveillance or attacks, and in either case, they would not be hovering in place with their lights on for extended periods of time.  No malicious actor would want to draw attention to themselves by hovering in place with their lights on, especially in a high-security area like a military base.&lt;/p&gt;
&lt;p&gt;One funny story I have from my own experience is that I once had to rush to respond to a drone incident in the NCR (National Capital Region) because someone reported that a drone was dropping unknown &quot;payloads&quot; on the roof of a instillation.  We set up multiple cameras and RF scanners to try and catch the drone in the act, but all we ended up finding was a bird that was flying around and dropping clams on the roof to break their shells.  That was the mysterious &quot;payload&quot; that was being reported.&lt;/p&gt;
</content:encoded><author>Nick Ashworth</author></item></channel></rss>