Refusing to Feature Without Blocking | Why I Removed Social Media Sharing Buttons For a long time, I featured social media sharing buttons prominently on my website. I didn’t find them especially useful. However, I thought they improved the experience for readers. Other people expected them. I believed, at the […]
Serious Horseplay | When Gifts Become Trojan Horses
Gifts as Trojan Horses | The Security Risk of Swag, Pins, and USB Drives Why high-trust tokens can create low-noise risk, and what “good tradecraft” looks like. The Gift That Keeps on Giving It’s a shame, but it’s reality: sometimes the easiest way into a sensitive environment isn’t hacking […]
The Good Anomalies
The Good Anomalies | Noticing the Good After You’ve Spent Your Career Seeing the Bad Keeping your signal accurate after years of seeing the worst I spent a long time doing what people in high-friction jobs learn to do: log what matters. When your work lives close to risk—cybersecurity, incident […]
Announcing the Unofficial Doing It Right Award
Announcing the Unofficial Doing It Right Award This is how you do it right. Real stories of course correction, algorithmic integrity, and the people who still remember why they built these systems in the first place. It’s for those who still understand how to keep these systems accountable. Over the […]
Hunter Storm Presents | Femme Fatale to Federal Whistleblower | ISACA Central Ohio Chapter 2026
Femme Fatale to Federal Whistleblower | Insider Threat Lessons You Can’t Get Anywhere Else Status Update | January 8, 2026 Today’s ISACA session was cancelled due to a technical issue with the Zoom session. I appreciate the professionalism of the organizers and look forward to rescheduling the conversation. These discussions […]
Merry Christmas 2025 | A Wish for the People Who Never Fully Get the Day Off
Merry Christmas 2025 | A Wish for the People Who Never Fully Get the Day Off Originally published December 24, 2025 It’s Christmas Eve in the United States, and I’m saying, “Merry Christmas!” Everyone is free to call it whatever they like. That part isn’t the point. The point […]
When the “Good Guys” Normalize Theft | Hacking Human Ethics and IP
When the “Good Guys” Normalize Theft | Hacking Human Ethics and IP Abstract In fields built on trust, integrity, and protection, such as cybersecurity, research, and intelligence-adjacent work, the normalization of intellectual theft and plagiarism represents not a minor ethical lapse, but a systemic failure. This article explains […]



