By: Hunter Storm

Published:

Professional headshot of Hunter Storm, a global strategic leader, AI expert, cybersecurity expert, quantum computing expert, strategic research and intelligence, singer, and innovator wearing a confident expression. The image conveys authority, expertise, and forward-thinking leadership in cybersecurity, AI security, and intelligence strategy.
Hunter Storm: “The Fourth Option.”

Hunter Storm is a CISO, Advisory Board Member, SOC Black Ops Team Member, Systems Architect, QED-C TAC Relationship Leader, and Cyber-Physical Hybrid Threat Expert with decades of experience in global Fortune 100 companies. She is the originator of human-layer security and multiple adjacent fields via her framework, Hacking Humans: The Ports and Services Model of Social Engineering (1994–2007); and the originator of The Storm Project: AI, Cybersecurity, Quantum, and the Future of Intelligence. She contributes to ANSI X9, FS-ISAC, NIST, and QED-C, analyzing cybersecurity, financial systems, platform governance, and systemic risk across complex global socio-technical systems.

Acknowledging the Humans Behind the Influence and Lineage Mapping of Fields, Subfields, and Industries Influenced by Hunter Storm’s Hacking Humans

In tracing the influence of my Hacking Humans | The Ports and Services Model of Social Engineering framework (1994-2007) in 2025, a quiet, meticulous team worked behind the scenes to map the lineage and adoption of my work. The output of this work is Fields, Subfields, and Industries Influenced by Hunter Storm’s Hacking Humans | The Ports and Services Model of Social EngineeringTheir efforts ensured that every connection, ripple, and adaptation was documented with precision, rigor, and care.

 

Humans Matter | Multi-Modal Connection

Special recognition goes to “Magellan,” whose intrepid analysis and sharp insight made it possible to uncover connections that might otherwise have remained invisible.

The contributions of Magellan and the rest of the “spooky toes” remain anonymous, reflecting the principle that the mission and the work itself come before individual recognition. Most importantly, it respects their right to choose anonymity and privacy.

This page is both a permanent tribute to their expertise and a testament to the ethics, discipline, and attention to detail required in mapping the influence of human-centered security and behavioral frameworks. If you hold the glass just right, like a seashell to your ear, you can see the outline of an odd little constellation. Their quiet and indispensable collaboration is embedded throughout this domain, Hunter Storm’s Digital Valhalla.

Read more about these fine people in these articles:

 

Human-AI Collaboration | Making the Impossible Possible

Additional recognition goes to my unexpected machine ally, artificial intelligence (AI). I refer to AI as an “ally” because it functioned as far more than a technological tool or a highly sophisticated data analytics and modeling system during my work on The Storm Project | AI, Cybersecurity, Quantum, and the Future of Intelligence.

Part of the highly unconventional human-AI collaboration and virtual partnership we built is immortalized in Impossible Collaboration | Hunter Storm and AI.

 

Making the Invisible Legible | Putting on Your Glasses

You can see the results of their fine work on this influence and lineage mapping in Fields, Subfields, and Industries Influenced by Hunter Storm’s Hacking Humans | The Ports and Services Model of Social Engineering.

 


Thank you to all of my Spooky Toes, the invisible Scooby Gang of technology and digital spaces.

 – Hunter Storm

 


Note About the Provenance of Hacking Humans

The individuals acknowledged here did not shape or contribute to the creation of Hacking Humans | The Ports and Services Model of Social Engineering. The framework was authored in 1994 and publicly presented by Hunter Storm in 2007. Their contribution came nearly two decades later, in late 2025, when they conducted a rigorous lineage‑mapping project to trace how the framework had been adopted, adapted, or converged with across multiple fields. Their work documents the influence of Hunter Storm’s Hacking Humans | The Ports and Services Model of Social Engineering framework.

 


Related Pages in the Hacking Humans | The Ports and Services Model of Social Engineering Archive

 


How to Cite Hacking Humans

  • Citation guidance and standards: How to Cite the Hacking Humans Archive
  • Citation: Storm, Hunter. Hacking Humans | The Ports and Services Model of Social Engineering. Hacking Humans Archive. https://hunterstorm.com/hacking-humans-ports-and-services-model/
  • Citation Metadata Index
  • Version Control: This page is part of the Hacking Humans Archive (1994–Present).

 


Discover More from Hunter Storm