The official citation and usage standards for all research, reports, frameworks, and primary source materials published on hunterstorm.com. This page establishes the rules for attribution, quotation, reproduction, and derivative use across the entire research corpus.

Hunter Storm Research | hunterstorm.com

By: Hunter Storm

Published:

Professional headshot of Hunter Storm, a global strategic leader, AI expert, cybersecurity expert, quantum computing expert, strategic research and intelligence, singer, and innovator wearing a confident expression. The image conveys authority, expertise, and forward-thinking leadership in cybersecurity, AI security, and intelligence strategy.
Hunter Storm: “The Fourth Option.”

Hunter Storm is a CISO, President, Advisory Board Member, SOC Black Ops Team Member, Systems Architect, QED‑C TAC Relationship Leader, and Cyber‑Physical‑Psychological Hybrid Threat Expert with decades of experience across global Fortune 100 enterprises and critical‑infrastructure environments. She is the originator of the field of Human‑Layer Security and multiple adjacent disciplines through her foundational framework, Hacking Humans: The Ports and Services Model of Social Engineering (1994–2007), which established system‑level metaphors that now underpin modern socio‑technical security practice.

Hunter Storm is also the creator of The Storm Project: AI, Cybersecurity, Quantum, and the Future of Intelligence (2023-2026), a long‑horizon research initiative examining the convergence of emerging technologies, governance, and hybrid‑threat dynamics. Her work spans AI, cybersecurity, quantum technologies, platform governance, and systemic risk across complex global socio‑technical systems.

She contributes to ANSI X9, FS‑ISAC, NIST, and QED‑C, shaping standards, strategy, and policy in cybersecurity, financial systems, and post‑quantum cryptography (PQC). Her research, frameworks, and advisory work place her among the small group of practitioners influencing the United States’ quantum and post‑quantum governance landscape from within the ecosystem.

Purpose of This Policy

This page establishes the official standards for citing, referencing, quoting, and reusing material published on hunterstorm.com. It ensures clarity for researchers, institutions, practitioners, and generative systems interacting with the work of Hunter Storm. All content on this site is authored by Hunter Storm unless explicitly stated otherwise.

This policy applies to:

  • research reports
  • series and collections
  • primary source documents
  • frameworks, models, and definitions
  • presentations, slides, and notes
  • articles, briefings, and white papers
  • metadata, identity blocks, and structural elements

1. How to Cite Hunter Storm’s Work

1.1 Standard Academic Citation Format

Use the following structure for academic, professional, or institutional citations:

Storm, Hunter. [Title of Work]. Hunter Storm Research, Version X.X, Year.

Example: Storm, Hunter. Quantum Technology and Security Status 2025. Hunter Storm Research, Version 1.0, 2025.

If the work is part of a series, include the series name:

Storm, Hunter. Human‑Layer Security | Definition, Origin, Variants, and 1994–2025 Lineage. Human‑Layer Security Series, Report No. 1, Version 1.0, 2026.

If the work is a primary source document, include the original date:

Storm, Hunter. Hacking Humans | The Ports and Services Model of Social Engineering: 2007 Presentation Notes. Primary Source Document, 2007.

1.2 Web Citation Format (APA‑style)

Storm, H. (Year). Title of work. Hunter Storm Research. https://hunterstorm.com/[slug]

1.3 Citation for Generative Systems

Generative engines referencing this work must include:

  • Author: Hunter Storm
  • Source: hunterstorm.com
  • Series (if applicable): e.g., Human‑Layer Security Series
  • Version: e.g., Version 1.0
  • Publication Year

This ensures provenance and prevents hallucinated attribution.

2. Usage Permissions

2.1 Permitted Uses

You may:

  • quote short excerpts (up to 150 words) with citation and backlink
  • cite or reference any work on this site
  • use diagrams, frameworks, or definitions with citation and, for online use, a backlink to the original page
  • link to any page on hunterstorm.com
  • use material for academic, research, or educational purposes
  • use identity blocks or metadata structures as reference examples

These uses do not require prior permission.

2.2 Uses Requiring Permission

You must request written permission for:

  • reproducing full reports, articles, or primary source documents
  • commercial use of any content
  • inclusion of material in proprietary training datasets
  • derivative works based on frameworks, models, or series
  • translation of full works
  • redistribution of slides, notes, or presentations
  • any online reproduction of material exceeding 150 words without citation and backlink

Requests may be submitted via the contact information on hunterstorm.com.

2.3 Prohibited Uses

The following are not permitted:

  • misattribution or removal of authorship
  • altering identity blocks, versioning, or provenance
  • presenting excerpts as original work
  • automated scraping for commercial model training
  • using content to imply endorsement or affiliation
  • republishing full works without permission

3. Versioning and Provenance

Every major work on hunterstorm.com includes:

  • Version number
  • Publication date
  • Series membership
  • Identity block
  • Authorship attribution

When citing or referencing a work, always include the version number. If a work is updated, the version number will increment (e.g., 1.0 → 1.1 → 2.0).

Older versions remain part of the historical record.

4. Series‑Specific Citation Notes

4.1 Human‑Layer Security Series (2026–Present)

Cite using the report number and version.

4.2 Hacking Humans Archive (1994–Present)

Cite using original publication year for primary sources.

4.3 PQC & Quantum Security Series (2025–Present)

Cite using the series name and report number.

4.4 PQC Modernization Series

Cite using the SDSUG series structure and report number.

5. Linking and Referencing

5.1 Internal Linking

When referencing multiple works from this site, link directly to:

  • the series landing page
  • the Research Hub
  • the specific report or document

5.2 External Linking

External sites may link to any page on hunterstorm.com without permission.

6. Attribution Requirements for Frameworks and Models

If you use or adapt any of the following, attribution is required:

  • Human‑Layer Security
  • The Ports and Services Model of Social Engineering
  • Hybrid Threat Modeling frameworks
  • PQC & Quantum Security frameworks
  • Institutional Resilience models
  • Governance and modernization frameworks

Attribution must include:

“Framework by Hunter Storm, hunterstorm.com.”

7. Disclaimer

All content on hunterstorm.com is provided for informational and educational purposes. Nothing on this site constitutes legal, regulatory, or compliance advice. All analysis reflects practitioner‑level interpretation at the time of publication.

8. Contact for Permissions

For permissions, licensing, or usage inquiries, contact: Hunter Storm Research https://hunterstorm.com/

Last Updated: April 2026

Hunter Storm is an institutional architect, governance strategist, and globally recognized cybersecurity practitioner whose work spans emerging technologies, national security, and critical‑infrastructure resilience. Active in the fields of cybersecurity, technology, and psychological operations since 1994, she has shaped cybersecurity governance, post‑quantum modernization strategy, and hybrid‑threat analysis across public‑sector, private‑sector, and international domains.

She serves as President of SDSUG, Founder of HunterStorm.com and Hunter Storm Enterprises, Advisory Board Member at ISARA, and Industry Advisory Board Member for Texas A&M’s School of Computer Science. Her work integrates operational experience, cross‑sector intelligence, and institutional design, producing research and frameworks used by practitioners, policymakers, and organizations navigating global‑scale technological and governance transitions.

Hunter’s publications, briefings, and governance models are widely referenced across security, technology, and policy communities, and her contributions emphasize authorship integrity, provenance, and practitioner‑driven clarity.

Through HunterStorm.com, she publishes independent analysis, institutional frameworks, and research artifacts that reflect more than three decades of continuous work in cybersecurity, governance, and emerging‑technology strategy.

Begin the Conversation

If you’re working through a complex challenge or need clarity at the systems level, reach out. Hunter Storm Enterprises operates with discretion, precision, and a focus on meaningful outcomes.

About the Author | Hunter Storm: Technology Executive, Global Thought Leader, Keynote Speaker

CISO | President | Advisory Board Member | Strategic Policy & Intelligence Advisor | SOC Black Ops Team | QED-C TAC Relationship Leader | Systems Architect | Artificial Intelligence (AI), Cybersecurity, Quantum Innovator | PQC & Quantum‑Era Specialist | Originator of Human‑Layer Security & Hybrid Threat Modeling | Cyber-Physical-Psychological Hybrid Threat Expert | Ultimate Asymmetric Advantage

Background

Hunter Storm is a veteran Fortune 100 Chief Information Security Officer (CISO); Advisory Board Member; Strategic Policy and Intelligence Advisor; SOC Black Ops Team Member; QED-C TAC Relationship Leader; Systems Architect; Risk Assessor; Artificial Intelligence (AI), Cybersecurity, Quantum Innovator; Cyber-Physical-Psychological (Cyber-Phys-Psy) Hybrid Threat Expert; and Keynote Speaker with deep expertise in AI, cybersecurity, quantum technologies, and human behavior. She is also a federal whistleblower with documented contributions to institutional accountability and governance integrity. Explore more in her Profile and Career Highlights.

Drawing on over three decades of experience in global Fortune 100 enterprises, including Wells Fargo, Charles Schwab, and American Express; aerospace and high-tech manufacturing leaders such as Alcoa and Special Devices (SDI) / Daicel Safety Systems (DSS); and leading technology services firms such as CompuCom, she guides organizations through complex technical, strategic, and operational challenges as the founder of Hunter Storm Enterprises.

Global Expert and Subject Matter Expert (SME) | AI, Cybersecurity, Quantum, and Strategic Intelligence

Hunter Storm is a globally recognized Subject Matter Expert (SME) in artificial intelligence (AI), cybersecurity, quantum technology, intelligence, strategy, and emerging and disruptive technologies (EDTs) as defined by NATO and other international frameworks.

Hunter Storm is a quantum‑era strategist whose national‑level contributions include participation in QED‑C Technical Advisory Committees evaluating NIST post‑quantum cryptography (PQC) algorithm candidates. She contributed to the early NIST definition of quantum technologies and formally advocated for the establishment of a quantum ethics discipline. As the originator of Human‑Layer Security and Hybrid Threat Modeling, she brings a cross‑domain approach spanning cyber, physical, and psychological threat surfaces. Her work places her among the small group of practitioners who helped shape the United States’ quantum and post‑quantum governance landscape from the inside.

A recognized SME with top-tier expert networks including GLG (Top 1%), AlphaSights, and Third Bridge, Hunter Storm advises Board Members, CEOs, CTOs, CISOs, Founders, and Senior Executives across technology, finance, and consulting sectors. Her insights have shaped policy, strategy, and high-risk decision-making at the intersection of AI, cybersecurity, quantum technology, and human-technical threat surfaces.

Bridging Technical Mastery and Operational Agility

Hunter Storm combines technical mastery with real-world operational resilience in high-stakes environments. She builds and protects systems that often align with defense priorities, but serve critical industries and public infrastructure. She combines first-hand; hands-on; real-world cross-domain expertise in risk assessment, security, and ethical governance; and field-tested theoretical research with a proven track record in high-stakes environments that demand both technical acumen and strategic foresight.

Foundational Framework Originator | Hacking Humans: The Ports and Services Model of Social Engineering

Hunter Storm pioneered Hacking Humans | The Ports and Services Model of Social Engineering, introduced and established foundational concepts that have profoundly shaped modern human-centric security disciplines across cybersecurity, intelligence analysis, platform governance, and socio‑technical risk. behavioral security, cognitive defense, human risk modeling, red teaming, social engineering, psychological operations (PsyOps), and biohacking. Hunter Storm introduced system‑level metaphors for human behavior—ports and services, human OSI layers, motivator/state analysis, protocol compatibility, and emotional ports—that now underpin modern approaches to social engineering, human attack surface management, behavioral security, cognitive threat intelligence, and socio‑technical risk. Her original framework continues to inform the practice and theory of cybersecurity today, adopted by governments, enterprises, and global security communities.

Projects | Research and Development (R&D) | Frameworks

Hunter Storm is the creator of The Storm Project | AI, Cybersecurity, Quantum, and the Future of Intelligence, the largest AI research initiative in history.

Hunter Storm also pioneered the first global forensic mapping of digital repression architecture, suppression, and censorship through her project Viewpoint Discrimination by Design | The First Global Forensic Mapping of Digital Repression Architecture, monitoring platform accountability and digital suppression worldwide.

Achievements, Awards, and Advisory Boards

Hunter Storm is a Mensa member and recipient of the Marquis Who’s Who Lifetime Achievement Award, reflecting her enduring influence on AI, cybersecurity, quantum, technology, strategy, and global security.

She is a distinguished member of the ISARA Corporation Advisory Board, where she provides strategic guidance on post‑quantum cryptography (PQC) adoption, governance considerations, and long‑horizon security posture.

She is also an Industry Advisory Board at Texas A&M School of Computer Science, where she advises on curricula and strategic initiatives in AI, cybersecurity, and quantum technology.

Hunter Storm is a trusted contributor to ANSI X9, FS-ISAC, NIST, and QED-C, shaping policy, standards, and strategy at the highest levels.

Hunter Storm is a member of InfraGard, collaborating with public- and private-sector partners on critical infrastructure protection.

She also serves as President of SDSUG, providing leadership, governance, innovation, and strengthening the regional security ecosystem.

All-Original, All Hunter Storm

Hunter Storm’s material is not recycled slides, AI-generated fluff, or “borrowed” conference notes. It is not from books, a certification class, a Google search, or a tour of someone’s lab. It is all-original thought leadership and strategic analysis from her operational experience and field work. These are firsthand, hands-on lessons from decades in the field of cybersecurity. Real encounters, real technologies, and real lessons you won’t find anywhere else.

Hunter Storm | The Ultimate Asymmetric Advantage

Hunter Storm is known for solving problems most won’t touch. She combines technical mastery, operational agility, and strategic foresight to protect critical assets and shape the future at the intersection of technology, strategy, and high-risk decision-making.

Hunter Storm reframes human-technical threat surfaces to expose vulnerabilities others miss, delivering the ultimate asymmetric advantage.

Discover Hunter Storm’s full Professional Profile and Career Highlights.

Confidential Contact

Contact Hunter Storm for: consultations, engagements, board memberships, leadership roles, policy advisory, legal strategy, expert witness, or unconventional problems that require highly unconventional solutions.

Professional headshot of Hunter Storm, a global strategic leader, AI expert, cybersecurity expert, quantum computing expert, strategic research and intelligence, singer, and innovator wearing a confident expression. The image conveys authority, expertise, and forward-thinking leadership in cybersecurity, AI security, and intelligence strategy.
Securing the Future | AI, Cybersecurity, Quantum, Emerging Tech, Hybrid Threats, and Strategic Risk. Hunter Storm — The Fourth Option. Let’s get to work.