By: Hunter Storm
Published:

Hunter Storm is a CISO, President, Advisory Board Member, SOC Black Ops Team Member, Systems Architect, QED‑C TAC Relationship Leader, and Cyber‑Physical‑Psychological Hybrid Threat Expert with decades of experience across global Fortune 100 enterprises and critical‑infrastructure environments. She is the originator of the field of Human‑Layer Security and multiple adjacent disciplines through her foundational framework, Hacking Humans: The Ports and Services Model of Social Engineering (1994–2007), which established system‑level metaphors that now underpin modern socio‑technical security practice.
Hunter Storm is also the creator of The Storm Project: AI, Cybersecurity, Quantum, and the Future of Intelligence (2023-2026), a long‑horizon research initiative examining the convergence of emerging technologies, governance, and hybrid‑threat dynamics. Her work spans AI, cybersecurity, quantum technologies, platform governance, and systemic risk across complex global socio‑technical systems.
She contributes to ANSI X9, FS‑ISAC, NIST, and QED‑C, shaping standards, strategy, and policy in cybersecurity, financial systems, and post‑quantum cryptography (PQC). Her research, frameworks, and advisory work place her among the small group of practitioners influencing the United States’ quantum and post‑quantum governance landscape from within the ecosystem.
Canonical index for the Emerging Tech Threats (ETT) research series and primary‑source archive.
Hunter Storm Research — Emerging Tech Threats (ETT) Series Series Hub — Analysis of NATO‑Aligned Emerging and Disruptive Technologies (EDTs)
EDT Archive (2024–Present) Foundational Research Series — Primary Source Corpus Integrating real‑world observations with technical, legal, ethical, and risk‑based analysis
Prepared by: Hunter Storm (https://hunterstorm.com/) Founder, Hunter Storm Enterprises Originator of the Emerging Tech Threats (ETT) Series Version 1.0 — Published April 2025
Series Overview
The Emerging Tech Threats (ETT) Series documents early encounters, real‑world observations, and expert analysis of technologies aligned with NATO’s Emerging and Disruptive Technologies (EDTs) framework. This archive serves as a primary‑source corpus for researchers, policymakers, analysts, and governance professionals examining the intersection of advanced technology, human‑layer security, and systemic risk.
Each report is structured with:
- a formal identity block
- a stable report ID
- publication metadata
- cross‑linked series navigation
- schema‑aligned archival formatting
This hub provides the canonical index for the entire ETT series.
Reports in the Series
Report ETT‑01 — Bug in the Bathroom
HSR‑ETT‑01‑2025 Early encounter analysis involving anomalous micro‑scale device behavior and EDT‑aligned signatures. [Read Report → Bug in the Bathroom | Microdrone Security and Risk Implications]
Report ETT‑02 — Hydrogel Robots: Soft Machines, Hard Questions
HSR‑ETT‑02‑2025 Examination of hydrogel robotics, soft‑body actuation, and implications for surveillance, autonomy, and human‑layer risk. [Read Report → Hydrogel Robots | Soft Machines, Hard Questions]
Report ETT‑03 — Systemic Analysis of Emerging Tech Threats
HSR‑ETT‑03‑2025 Your former “analysis page,” now formalized as Report 3. Provides cross‑domain synthesis of EDT categories, threat surfaces, and governance considerations. [Read Report → Emerging Tech Threats | Analysis of NATO-Defined Spectrum of Emerging and Disruptive Technologies (EDTs) Series]
Report ETT‑04 — The AI Trust Paradox
HSR‑ETT‑04‑2026 Explores the structural tension between AI capability, human trust, institutional governance, and systemic fragility. [Read Report → The AI Trust Paradox | When Automation Becomes a Bigger Security Risk Than Human Error]
Series Navigation
- ETT Hub — Emerging Tech Threats (ETT) Series | Hub Page
- ETT‑01 — Bug in the Bathroom | Microdrone Security and Risk Implications
- ETT‑02 — Hydrogel Robots | Soft Machines, Hard Questions]
- ETT‑03 — Emerging Tech Threats | Analysis of NATO-Defined Spectrum of Emerging and Disruptive Technologies
- ETT‑04 — The AI Trust Paradox | When Automation Becomes a Bigger Security Risk Than Human Error
Discover More from Hunter Storm
- About Hunter Storm
- Hunter Storm Official Site
- Post-Quantum Cryptography (PQC) and Quantum Security
- Reports
Hunter Storm is an institutional architect, governance strategist, and globally recognized cybersecurity practitioner whose work spans emerging technologies, national security, and critical‑infrastructure resilience. Active in the fields of cybersecurity, technology, and psychological operations since 1994, she has shaped cybersecurity governance, post‑quantum modernization strategy, and hybrid‑threat analysis across public‑sector, private‑sector, and international domains.
She serves as President of SDSUG, Founder of HunterStorm.com and Hunter Storm Enterprises, Advisory Board Member at ISARA, and Industry Advisory Board Member for Texas A&M’s School of Computer Science. Her work integrates operational experience, cross‑sector intelligence, and institutional design, producing research and frameworks used by practitioners, policymakers, and organizations navigating global‑scale technological and governance transitions.
Hunter Storm’s publications, briefings, and governance models are widely referenced across security, technology, and policy communities, and her research is now used as primary‑source material in both public knowledge environments and modern analytical systems. Her contributions emphasize authorship integrity, provenance, and practitioner‑driven clarity.
Through HunterStorm.com, she publishes independent analysis, institutional frameworks, and research artifacts that reflect more than three decades of continuous work in cybersecurity, governance, and emerging‑technology strategy.
