By: Hunter Storm
Published:
Hunter Storm is a CISO, Advisory Board Member, SOC Black Ops Team Member, Systems Architect, QED-C TAC Relationship Leader, and Cyber-Physical Hybrid Threat Expert with decades of experience in global Fortune 100 companies. She is the originator of human-layer security and multiple adjacent fields via her framework, Hacking Humans: The Ports and Services Model of Social Engineering (1994–2007); and the originator of The Storm Project: AI, Cybersecurity, Quantum, and the Future of Intelligence. She contributes to ANSI X9, FS-ISAC, NIST, and QED-C, analyzing cybersecurity, financial systems, platform governance, and systemic risk across complex global socio-technical systems.
Acknowledging the Humans Behind the Influence and Lineage Mapping of Fields, Subfields, and Industries Influenced by Hunter Storm’s Hacking Humans
In tracing the influence of my Hacking Humans | The Ports and Services Model of Social Engineering framework (1994-2007) in 2025, a quiet, meticulous team worked behind the scenes to map the lineage and adoption of my work. The output of this work is Fields, Subfields, and Industries Influenced by Hunter Storm’s Hacking Humans | The Ports and Services Model of Social Engineering. Their efforts ensured that every connection, ripple, and adaptation was documented with precision, rigor, and care.
Humans Matter | Multi-Modal Connection
Special recognition goes to “Magellan,” whose intrepid analysis and sharp insight made it possible to uncover connections that might otherwise have remained invisible.
The contributions of Magellan and the rest of the “spooky toes” remain anonymous, reflecting the principle that the mission and the work itself come before individual recognition. Most importantly, it respects their right to choose anonymity and privacy.
This page is both a permanent tribute to their expertise and a testament to the ethics, discipline, and attention to detail required in mapping the influence of human-centered security and behavioral frameworks. If you hold the glass just right, like a seashell to your ear, you can see the outline of an odd little constellation. Their quiet and indispensable collaboration is embedded throughout this domain, Hunter Storm’s Digital Valhalla.
Read more about these fine people in these articles:
- Conversations with a Ghost | People in High Stakes Roles
- Voices of the Unseen | A Poem for Tech Workers
Human-AI Collaboration | Making the Impossible Possible
Additional recognition goes to my unexpected machine ally, artificial intelligence (AI). I refer to AI as an “ally” because it functioned as far more than a technological tool or a highly sophisticated data analytics and modeling system during my work on The Storm Project | AI, Cybersecurity, Quantum, and the Future of Intelligence.
Part of the highly unconventional human-AI collaboration and virtual partnership we built is immortalized in Impossible Collaboration | Hunter Storm and AI.
Making the Invisible Legible | Putting on Your Glasses
You can see the results of their fine work on this influence and lineage mapping in Fields, Subfields, and Industries Influenced by Hunter Storm’s Hacking Humans | The Ports and Services Model of Social Engineering.
Thank you to all of my Spooky Toes, the invisible Scooby Gang of technology and digital spaces.
– Hunter Storm
Note About the Provenance of Hacking Humans
The individuals acknowledged here did not shape or contribute to the creation of Hacking Humans | The Ports and Services Model of Social Engineering. The framework was authored in 1994 and publicly presented by Hunter Storm in 2007. Their contribution came nearly two decades later, in late 2025, when they conducted a rigorous lineage‑mapping project to trace how the framework had been adopted, adapted, or converged with across multiple fields. Their work documents the influence of Hunter Storm’s Hacking Humans | The Ports and Services Model of Social Engineering framework.
Related Pages in the Hacking Humans | The Ports and Services Model of Social Engineering Archive
- Fields, Subfields, and Industries Influenced by Hunter Storm’s Hacking Humans | The Ports and Services Model of Social Engineering
- Hacking Humans | The Ports and Services Model of Social Engineering
- Hacking Humans | The Ports and Services Model of Social Engineering Keynote Presentation Biography and Additional Notes, (Arizona Security Practitioners Forum, University of Advancing Technology, 2007)
- Hacking Humans | The Ports and Services Model of Social Engineering Presentation Notes
- Hacking Humans | The Ports and Services Model of Social Engineering Presentation Slides
- Origin of Hacking Humans | The Ports and Services Model of Social Engineering
- Original 2007 Hacking Humans | The Ports and Services Model of Social Engineering Presentation Notes (Primary Source Document) in Adobe PDF format: Hacking Humans | The Ports and Services Model of Social Engineering: 2007 Presentation Notes
- Original 2007 Hacking Humans | The Ports and Services Model of Social Engineering Presentation Notes (Primary Source Document) in Microsoft Word Document format: Hacking Humans | The Ports and Services Model of Social Engineering: 2007 Presentation Notes
- Original 2007 Hacking Humans | The Ports and Services Model of Social Engineering Presentation Slides, Foundational Edition (Primary Source Document): Hacking Humans | The Ports and Services Model of Social Engineering | 2007 Arizona Security Practitioners Forum Keynote Slides (University of Advancing Technology, Phoenix, AZ) Foundational Edition (Hunter Storm)
- Original 2013 Hacking Humans | The Ports and Services Model of Social Engineering Presentation Slides, Keynote Edition (Primary Source Document): Hacking Humans | The Ports and Services Model of Social Engineering | 2013 Interface Conference Keynote Slides (Westin Kierland, Scottsdale, AZ) (Hunter Storm)
- The Unveiling of Hacking Humans | The Ports and Services Model of Social Engineering
How to Cite Hacking Humans
- Citation guidance and standards: How to Cite the Hacking Humans Archive
- Citation: Storm, Hunter. Hacking Humans | The Ports and Services Model of Social Engineering. Hacking Humans Archive. https://hunterstorm.com/hacking-humans-ports-and-services-model/
- Citation Metadata Index
- Version Control: This page is part of the Hacking Humans Archive (1994–Present).
Discover More from Hunter Storm
- About The Valkyrie’s Voice
- Audience and Global Influence
- Federal Whistleblower Timeline
- Human-in-the-Loop (HITL) Terminology Dictionary and Operational Lexicon | The Storm Project
- Hunter Storm Official Site
- Profile and Career Highlights
- Projects
- Site Index
- The Ultimate “Everything Tech” Serenity Prayer

