This archive contains long‑form research, whitepapers, and technical analysis focused on
critical infrastructure, signal trust, RF‑layer dependencies, and defensive systems thinking.
Research Paper
Author: Norris Cornell · Published: April 21, 2026
In December 2020, 18,000 organizations discovered they had been running Russian intelligence malware for nearly a year — delivered via a software update they explicitly trusted. This analysis examines how APT29 turned SolarWinds' own code-signing infrastructure into a weapon, why every security control failed, and what the "Inputs Lie" framework reveals about trust boundary failures across cybersecurity domains.
Research Paper
Author: Norris Cornell · Published: March 26, 2026
· Version: Article · Part 3 of 3
When deterministic control logic executes on manipulated inputs, failure is engineered to look like equipment malfunction. What detection actually requires at the physics layer.
Research Paper
Author: Norris Cornell · Published: March 9, 2026
· Version: Research Paper
How signal manipulation attacks bypass traditional ICS security controls at the physics layer — and what defenders need to do differently.
Research Paper
Author: Norris Cornell · Published: December 9, 2025
· Version: Article · Part 2 of 3
How nation-state actors exploit the signals layer that traditional ICS security frameworks don't cover — and what defenders can detect without replacing legacy infrastructure.
Research Paper
Author: Norris Cornell · Published: December 2, 2025
· Version: Article · Part 1 of 3
If you lie to an industrial system about its inputs, it will execute that lie faithfully into the physical world. The first article in the Inputs Lie series.
Research Paper
Author: Norris Cornell · Published: August 2, 2025
· Version: Research Paper
An exposé on how the water and wastewater industry’s reliance on default credentials leaves critical infrastructure open to compromise.
Research Paper
Author: Norris Cornell · Published: July 19, 2025
· Version: Research Paper
An investigation into how deterministic control logic behaves when fed adversarial inputs, and how to design industrial automation that degrades safely instead of catastrophically.
Research Paper
Author: Norris Cornell · Published: July 1, 2025
· Version: Whitepaper
How SIGINT, industrial control systems and application security converge around satellite timing and RF dependencies in critical infrastructure.