← Home

Writing

Essays on AI, defense technology, philosophy, and governance. Research papers at the intersection of ethics, autonomy, and systems design. A sci-fi novel in progress. The through-line: technology is a mirror — it shows us exactly what we value and exactly what we are willing to risk.

Published Essays

Research Papers

Defense-Driven Artificial Intelligence: Risks and Ethics in Autonomous Systems

Examines the ethical frameworks required for autonomous weapons and AI decision-making in high-stakes defense contexts. Argues for human-in-the-loop mandates as a non-negotiable design constraint.

Unpublished

Axiom Defense: A Strategy Analysis

Applies business, corporate, global, and innovation strategy frameworks to a leading defense AI company — analyzing autonomous platform development, targeted M&A, and niche government contracting as sources of competitive advantage in autonomous defense systems.

Doctoral Research· DIT8210 · Capella University

Information Assurance Compliance with Government Regulations

Argues that organizations achieving deep IA policy compliance succeed by embedding cybersecurity culture at every level — from leadership modeling to APT threat response. Examines the internal and external factors that determine compliance capability and methods to measure organizational cyber maturity.

Academic Paper· CIS598 · Strayer University

Legal and Ethical Aspects of Cyber Operations

Engages directly with Tallinn Manual Rules 4 and 9 (sovereignty and territorial jurisdiction) to argue that cyberspace sovereignty is unenforceable without international consensus — making intelligence collection on adversary infrastructure a moral obligation rather than a sovereignty violation.

Academic Paper· CIS560 · Strayer University

Cybersecurity Policy Catalog

A compliance architecture blueprint mapping interlocking cybersecurity policies — from access control and incident response to VPN and remote access governance — to specific HIPAA and NIST 800-53 requirements. Designed for healthcare IT environments handling ePHI at scale.

Academic Paper· CIS598 · Strayer University

ISI Access Control Plan Proposal

Proposes a defense-in-depth access control architecture for an organization handling classified data and PII — including VLAN segmentation, layered firewalls and IDS placement, file-level permissions, and a continuous asset management program.

Academic Paper· CIS560 · Strayer University

Hybrid Finance Models in the Age of DeFi: A Blockchain Framework for Traditional Institutions

Proposes an architecture for traditional financial institutions to adopt decentralized finance mechanisms without abandoning regulatory compliance or institutional risk controls.

Unpublished

Adaptive Governance in Decentralized Networks: AI-Enhanced Control Assurance

Explores how AI-driven monitoring can replace static governance frameworks in decentralized systems, enabling dynamic assurance without centralized authority.

Unpublished

Data Sovereignty and the Ethics of Algorithmic Surveillance

Examines who owns data in an AI-mediated world and what ethical obligations exist when algorithmic systems can infer facts individuals have never disclosed.

Unpublished

In Progress

Sci-Fi Novel — Undisclosed

A novel at the intersection of defense AI, consciousness, and what it means to be human in a world where machines have learned to simulate both. Setting and title undisclosed. Target: 2027.

In progress · Target 2027

Signature Essay

The Techwright Manifesto

On coining a new term for a new kind of practitioner — someone who builds production software by directing AI tools with decades of architectural judgment. Not a prompt engineer. Not a vibe coder. A Techwright.

Read the Manifesto →