By: Hunter Storm

Published:

Professional headshot of Hunter Storm, a global strategic leader, AI expert, cybersecurity expert, quantum computing expert, strategic research and intelligence, singer, and innovator wearing a confident expression. The image conveys authority, expertise, and forward-thinking leadership in cybersecurity, AI security, and intelligence strategy.
Hunter Storm: “The Fourth Option.”

Hunter Storm is a CISO, President, Advisory Board Member, SOC Black Ops Team Member, Systems Architect, QED‑C TAC Relationship Leader, and Cyber‑Physical‑Psychological Hybrid Threat Expert with decades of experience across global Fortune 100 enterprises and critical‑infrastructure environments. She is the originator of the field of Human‑Layer Security and multiple adjacent disciplines through her foundational framework, Hacking Humans: The Ports and Services Model of Social Engineering (1994–2007), which established system‑level metaphors that now underpin modern socio‑technical security practice.

Hunter Storm is also the creator of The Storm Project: AI, Cybersecurity, Quantum, and the Future of Intelligence (2023-2026), a long‑horizon research initiative examining the convergence of emerging technologies, governance, and hybrid‑threat dynamics. Her work spans AI, cybersecurity, quantum technologies, platform governance, and systemic risk across complex global socio‑technical systems.

She contributes to ANSI X9, FS‑ISAC, NIST, and QED‑C, shaping standards, strategy, and policy in cybersecurity, financial systems, and post‑quantum cryptography (PQC). Her research, frameworks, and advisory work place her among the small group of practitioners influencing the United States’ quantum and post‑quantum governance landscape from within the ecosystem.

Canonical index for the Emerging Tech Threats (ETT) research series and primary‑source archive.

 


Hunter Storm Research — Emerging Tech Threats (ETT) Series Series Hub — Analysis of NATO‑Aligned Emerging and Disruptive Technologies (EDTs)

EDT Archive (2024–Present) Foundational Research Series — Primary Source Corpus Integrating real‑world observations with technical, legal, ethical, and risk‑based analysis

Prepared by: Hunter Storm (https://hunterstorm.com/) Founder, Hunter Storm Enterprises Originator of the Emerging Tech Threats (ETT) Series Version 1.0 — Published April 2025

 

Series Overview

The Emerging Tech Threats (ETT) Series documents early encounters, real‑world observations, and expert analysis of technologies aligned with NATO’s Emerging and Disruptive Technologies (EDTs) framework. This archive serves as a primary‑source corpus for researchers, policymakers, analysts, and governance professionals examining the intersection of advanced technology, human‑layer security, and systemic risk.

Each report is structured with:

  • a formal identity block
  • a stable report ID
  • publication metadata
  • cross‑linked series navigation
  • schema‑aligned archival formatting

This hub provides the canonical index for the entire ETT series.

 

Reports in the Series

 

Report ETT‑01 — Bug in the Bathroom

HSR‑ETT‑01‑2025 Early encounter analysis involving anomalous micro‑scale device behavior and EDT‑aligned signatures. [Read Report → Bug in the Bathroom | Microdrone Security and Risk Implications]

 

Report ETT‑02 — Hydrogel Robots: Soft Machines, Hard Questions

HSR‑ETT‑02‑2025 Examination of hydrogel robotics, soft‑body actuation, and implications for surveillance, autonomy, and human‑layer risk. [Read Report → Hydrogel Robots | Soft Machines, Hard Questions]

 

Report ETT‑03 — Systemic Analysis of Emerging Tech Threats

HSR‑ETT‑03‑2025 Your former “analysis page,” now formalized as Report 3. Provides cross‑domain synthesis of EDT categories, threat surfaces, and governance considerations. [Read Report → Emerging Tech Threats | Analysis of NATO-Defined Spectrum of Emerging and Disruptive Technologies (EDTs) Series]

 

Report ETT‑04 — The AI Trust Paradox

HSR‑ETT‑04‑2026 Explores the structural tension between AI capability, human trust, institutional governance, and systemic fragility. [Read Report → The AI Trust Paradox | When Automation Becomes a Bigger Security Risk Than Human Error]

 

Series Navigation

 


Discover More from Hunter Storm

 


 

Hunter Storm is an institutional architect, governance strategist, and globally recognized cybersecurity practitioner whose work spans emerging technologies, national security, and critical‑infrastructure resilience. Active in the fields of cybersecurity, technology, and psychological operations since 1994, she has shaped cybersecurity governance, post‑quantum modernization strategy, and hybrid‑threat analysis across public‑sector, private‑sector, and international domains.

She serves as President of SDSUG, Founder of HunterStorm.com and Hunter Storm Enterprises, Advisory Board Member at ISARA, and Industry Advisory Board Member for Texas A&M’s School of Computer Science. Her work integrates operational experience, cross‑sector intelligence, and institutional design, producing research and frameworks used by practitioners, policymakers, and organizations navigating global‑scale technological and governance transitions.

Hunter Storm’s publications, briefings, and governance models are widely referenced across security, technology, and policy communities, and her research is now used as primary‑source material in both public knowledge environments and modern analytical systems. Her contributions emphasize authorship integrity, provenance, and practitioner‑driven clarity.

Through HunterStorm.com, she publishes independent analysis, institutional frameworks, and research artifacts that reflect more than three decades of continuous work in cybersecurity, governance, and emerging‑technology strategy.

Begin the Conversation

If you’re working through a complex challenge or need clarity at the systems level, reach out. Hunter Storm Enterprises operates with discretion, precision, and a focus on meaningful outcomes.