Writing
Technical notes, research fragments, and working drafts on cyber operations, information and cognitive warfare, AI, and the broader systems that shape the threat landscape.
-
2025-02-20
LLMs as influence accelerants: automating narrative warfare
How large language models are reshaping the economics of influence operations — and why current detection methods are already obsolete.
-
2025-02-12
Building a threat intel pipeline in Rust
Replacing a fragile Python ETL chain with a Rust-based ingestion pipeline. Benchmarks, architecture decisions, and lessons from production.
-
2025-02-03
eBPF for counterintelligence: tracing adversary behavior at the kernel level
Using eBPF to instrument Linux systems for real-time detection of lateral movement and data staging without relying on userspace agents.
-
2025-01-26
Genomic data exfiltration: the cyberbiosecurity threat no one is modeling
Sequencing pipelines are networked, poorly segmented, and full of sensitive data. Mapping the attack surface of modern bioinformatics infrastructure.
-
2025-01-22
Linux's /proc filesystem is a window into the running system. Here's exactly what you can and can't see as a regular user.
-
2025-01-18
Adversarial patches on embedded vision systems
Physical-world adversarial attacks against edge ML models running on ARM SBCs. Testing robustness on constrained hardware.
-
2025-01-15
Every blog starts somewhere. Here's what this one is about and what I expect to write.
-
2025-01-10
Python OSINT toolkit: automating open-source collection at scale
A modular Python framework for structured OSINT collection — async scrapers, entity resolution, and graph-based link analysis.