Skip to main content
Applied Intelligence Engineer · National Security Researcher

Burak Oktenli Governance Architectures for Safe Autonomous Systems

Developing operational governance architectures that enable safe, accountable, and controllable deployment of autonomous systems in critical infrastructure and national security environments. These architectures function as control layers governing how authority is granted, restricted, and recovered within autonomous systems. This work focuses on authority lifecycle control, decision integrity, and fail-safe recovery mechanisms that maintain human oversight in high-speed human-machine environments.

4 U.S. Provisional Patents Submitted (HMAA, CARA, SATA, FLAME)
17 Published Works with DOIs and Public Disclosures
Georgetown University, M.P.S. Applied Intelligence (In Progress)
140+ Professional Credentials from 25+ Institutions

Research Mission

The Problem. Autonomous systems are increasingly deployed in high-stakes operational environments including critical infrastructure, defense, and large-scale automated decision systems. Current architectures often lack robust mechanisms for managing authority delegation, revocation, and recovery when automated decisions interact with human oversight.

The Gap. Existing governance models typically focus on policy or high-level ethics frameworks rather than operational system architectures capable of enforcing authority boundaries in real-time autonomous decision environments.

My Contribution. I develop governance architectures that manage the full lifecycle of authority within autonomous systems, including assignment, monitoring, revocation, and recovery. These architectures are designed to preserve human control, maintain system accountability, and prevent uncontrolled escalation in high-speed decision environments. The resulting systems (HMAA, CARA, and SATA) are documented in three U.S. provisional patent submissions and three publicly available technical reports with DOIs on Zenodo.

Current Status. Pursuing a Master of Professional Studies in Applied Intelligence at Georgetown University. CARA evaluation methodology: 10M-iteration arithmetic property testing and 68-state control-flow enumeration, as documented in the Zenodo disclosure. Formal proof and hardware-in-the-loop validation remain future work.

Authority Lifecycle Governance

Assignment, delegation, monitoring, and revocation of operational authority in autonomous decision systems. Implemented in HMAA (U.S. Provisional 63/999,105).

Fail-Safe Control Recovery

Emergency override, automated escalation controls, and deterministic authority recovery following lockout events. Implemented in CARA (U.S. Provisional 64/000,170).

Decision Integrity Monitoring

Hardware-anchored sensor trust computation, continuous attestation verification, and anomaly detection for autonomous mission authority. Implemented in SATA (U.S. Provisional 64/002,453).

Escalation Risk Analysis

Quantitative analysis of decision-time compression and escalation pathways in AI-enabled command-and-control systems. Documented in ERAM framework papers on SSRN.

Flash War Latency Control

FLAME architecture: deterministic latency injection middleware preventing autonomous escalation in multi-domain command environments. Implements Strategic Latency as a formal engineered system with 5-state Circuit Breaker and D(A, tier, domain) delay function. Patent submitted: U.S. Provisional 64/005,607. Published on Zenodo: DOI 10.5281/zenodo.19015618.

Multi-Agent Trust Verification

MAIVA architecture: Byzantine-resilient swarm trust aggregation with CUSUM-augmented detection, graduated escalation, and DoDD 3000.09 action gate classification. 37 self-tests, TLA+ specification, sensitivity analysis. DOI: 10.5281/zenodo.19015517.

Adversarial Deception-Aware Risk

ADARA architecture: proactive deception prior that adjusts authority downward pre-emptively based on P(adversarial). Deception Probability Engine computes adversarial likelihood from input distribution anomalies, temporal correlation, and cross-sensor consistency. Includes Phantom Fleet detection module for AI-hallucinated hostile force scenarios.

Research Mission &
National Interest

1. Substantial Merit & National Importance

The proposed endeavor is the development of operational governance architectures for autonomous systems deployed in U.S. national security, defense, and critical infrastructure environments. This work addresses how authority is assigned, monitored, revoked, and recovered in human-machine teaming systems where operational decisions occur faster than human reaction time.

This domain has been identified as a national priority by:

  • U.S. Department of Defense (DoD Directive 3000.09, autonomous weapons governance)
  • NIST AI Risk Management Framework (AI RMF 1.0)
  • Presidential Policy Directive 21 (critical infrastructure protection)
  • National Security Commission on Artificial Intelligence (final report, 2021)
  • JADC2 strategy (human-machine command authority in contested environments)

2. Well Positioned to Advance the Endeavor

Evidence of positioning to advance this endeavor:

  • Four U.S. provisional patent submissions (2026) for original governance architectures (HMAA, CARA, SATA, MAIVA)
  • Three technical reports with DOIs on Zenodo (Georgetown University affiliation)
  • Nine research papers on AI governance and national security (SSRN / independent)
  • Six interactive technical simulations implementing the research architectures
  • M.P.S. Applied Intelligence, Georgetown University (STEM-designated, in progress)
  • B.Sc. Computer Science Engineering (USF) and MBA (Lynn University, 4.0 GPA)
  • STEM-OPT authorized employment in ITAR/EAR-regulated U.S. cloud infrastructure
  • 140+ professional credentials from 25+ institutions (IEEE, NIST, CompTIA, CISSP)

3. Benefit to the United States

Governance architectures for autonomous systems are increasingly important for U.S. national security, critical infrastructure resilience, and responsible deployment of advanced AI systems. Developing technical frameworks that maintain human oversight while enabling advanced automation contributes to safe adoption of autonomous technologies across strategic sectors.

  • No standardized authority lifecycle governance exists for autonomous systems in defense
  • The applicant's architectures address this gap with publicly disclosed, DOI-registered specifications
  • The work is grounded in U.S. institutions and U.S. regulatory frameworks (NIST, DoD)
  • Waiving the job offer requirement enables continued independent research in this critical domain

Research Programs

The proposed endeavor consists of four structured research programs, each with associated patent filings, technical reports, and published research:

  • Authority Lifecycle Governance (HMAA): A system for managing the delegation, monitoring, and revocation of operational authority within autonomous decision systems. Applications: defense systems, automated infrastructure management, high-reliability AI operations. Patent: U.S. Provisional 63/999,105.
  • Fail-Safe Control Recovery (CARA): Deterministic recovery protocol for authority lockout events with a terminal non-compensatory policy gate. Applications: autonomous weapons safety, nuclear-adjacent platform governance. Patent: U.S. Provisional 64/000,170.
  • Decision Integrity Monitoring (SATA): Hardware-anchored sensor trust computation providing continuous attestation verification for autonomous mission authority. Applications: sensor fusion governance, unmanned systems trust. Patent: U.S. Provisional 64/002,453.
  • Escalation Risk Analysis (ERAM): Quantitative framework for decision-time compression and escalation pathway modeling in AI-enabled command-and-control environments. Published on SSRN.
  • Flash War Latency Control (FLAME): Deterministic latency injection middleware for preventing autonomous escalation in multi-domain command architectures. Implements Strategic Latency as a formal engineered system with a 5-state Circuit Breaker State Machine, Dynamic Delay Function D(A, tier, domain), and Keep-Alive heartbeat protocol. Patent: U.S. Provisional 64/005,607. Published on Zenodo: DOI 10.5281/zenodo.19015618. Interactive simulation live.
  • Multi-Agent Trust Verification (MAIVA): Byzantine-resilient swarm trust aggregation architecture extending HMAA to multi-agent environments. Implements trimmed weighted median aggregation resistant to f adversaries in 3f+1 rosters, three-layer CUSUM-augmented anomaly detection, graduated escalation with per-level action permissions, and DoDD 3000.09 action gate classification. 37 self-tests, TLA+ formal specification. Published on Zenodo: DOI 10.5281/zenodo.19015517. Interactive simulation live.
  • Adversarial Deception-Aware Risk (ADARA): Proactive deception prior architecture that adjusts operational authority downward pre-emptively based on the probability that current inputs are adversarially manipulated. Implements a Deception Probability Engine computing P(adversarial) from input distribution anomalies, temporal correlation patterns, cross-sensor consistency scores, and Bayesian update over mission history. Deception-Adjusted Authority Formula: A_adj = A_hmaa × (1 - λ × P_deception). Includes Phantom Fleet detection module. Interactive simulation live.

Future Research Roadmap

This roadmap demonstrates a sustained, multi-year research agenda in the United States:

  • Near Term (1-3 years): Formal verification of HMAA/CARA/SATA governance architectures using TLA+ and model checking; expanded simulation environments with hardware-in-the-loop testbeds; human-machine authority interface models; FLAME (Flash War Latency Architecture) patent filed, Zenodo publication complete; completion of Georgetown M.P.S. Applied Intelligence program
  • Mid Term (3-5 years): Deployment frameworks for integration with U.S. critical infrastructure control systems; standards body engagement with NIST and IEEE for governance architecture standardization; pilot implementations in defense-adjacent operational environments; peer-reviewed publication of formal verification results
  • Long Term (5+ years): Standardized governance architecture specifications adopted across U.S. defense, intelligence, and critical infrastructure sectors; authority lifecycle governance as an established discipline within autonomous systems engineering; open reference implementations enabling U.S. industry adoption

Policy & Societal Impact

The applicant's work contributes to the following policy objectives:

  • Autonomous Systems Safety: Technical frameworks for maintaining human oversight and preventing uncontrolled autonomous escalation
  • AI Accountability: Cryptographically auditable authority decisions enabling post-incident reconstruction and regulatory compliance
  • Responsible Deployment: Governance architectures that enable advanced automation while preserving meaningful human control in safety-critical operations
  • Flash War Prevention: Decision latency architectures (FLAME, in development) designed to prevent AI-driven conflict escalation before human awareness

U.S. Impact: Potential Deployment Scenarios

The governance architectures developed in this research program address concrete operational needs across U.S. strategic sectors. The following deployment scenarios illustrate how these systems would function in real-world environments:

  • Autonomous Defense Systems: HMAA provides real-time authority computation for unmanned combat platforms, ensuring that weapons engagement authority follows a verifiable chain from human commander through automated decision layers, with CARA providing deterministic recovery if authority lockout occurs during a mission.
  • Critical Infrastructure Automation: Power grid, water treatment, and transportation systems using autonomous controllers require SATA-style continuous sensor attestation to verify that the data feeding automated decisions has not been tampered with or degraded.
  • AI Command and Control (JADC2): Multi-domain military operations increasingly rely on AI-assisted decision-making. ERAM provides escalation risk quantification that allows commanders to understand how decision-time compression affects authority integrity across interconnected systems.
  • Industrial Safety Systems: Aerospace manufacturing, petrochemical operations, and nuclear-adjacent facilities use autonomous monitoring systems that require formal governance over when automated systems can act independently versus when human authorization is mandatory.
  • Intelligence Community Applications: Automated intelligence processing and AI-augmented analysis systems require governance architectures that maintain auditable authority chains, ensuring that AI-assisted assessments can be traced back to human-authorized parameters.

Independently Verifiable
Documentation

Patent Submissions

HMAA: U.S. Provisional No. 63/999,105 (March 7, 2026)

CARA: U.S. Provisional No. 64/000,170 (March 9, 2026)

SATA: U.S. Provisional No. 64/002,453 (March 11, 2026)

FLAME: U.S. Provisional No. 64/005,607 (March 14, 2026)

All three submitted via USPTO Patent Center. Awaiting review.

Zenodo DOI Records

HMAA: DOI 10.5281/zenodo.18861653

CARA: DOI 10.5281/zenodo.18917790

SATA: DOI 10.5281/zenodo.18936251

MAIVA: DOI 10.5281/zenodo.19015517

FLAME: DOI 10.5281/zenodo.19015618

Verify on Zenodo ↗
University Affiliation

Georgetown University listed on Zenodo publication records. M.P.S. Applied Intelligence program (STEM-designated), School of Continuing Studies.

ORCID Researcher Identity

ORCID 0009-0001-8573-1667, verified researcher identity linking publications, patents, and institutional affiliation.

Verify on ORCID ↗
Google Scholar

Publication index with citation tracking and research metrics.

Verify on Google Scholar ↗
SSRN Author Page

Policy and strategic research papers on AI governance, escalation risk, and national security.

Verify on SSRN ↗
U.S. Work Authorization

STEM-OPT authorized employment at Blue.Cloud (Tampa, FL, 2021–2024). Data governance and cloud infrastructure in regulated environments.

Professional Certifications

CompTIA Security+ · CISSP Domain 1 · NIST RMF · NIST 800-171 · NIST CSF · AI in National Security (SCSP) · AI Strategy (Oxford/Wharton).

Technical Simulations

Six browser-based interactive simulations implementing the patent architectures and research frameworks (HMAA, CARA, SATA, FLAME, MAIVA, ADARA). All run client-side with real-time computation and verifiable outputs.

View Simulations ↗

Academic Training

In Progress
M.P.S. Applied Intelligence (STEM)
Georgetown University · School of Continuing Studies · Washington, D.C.
Program Details
MBA, International Business
Lynn University · Boca Raton, Florida
GPA: 4.0 / 4.0
Program Details
B.Sc. Computer Science Engineering (STEM)
University of South Florida · Tampa, Florida
GPA: 3.45 / 4.0
Program Details
4
U.S. Patents Submitted
17
Published Works
140+
Professional Credentials
25+
Institutions
2
STEM Degrees

Governance Architectures
for Autonomous Systems

Patent Submitted

Sensor Attestation & Trust Anchoring (SATA)

U.S. Provisional 64/002,453 · Filed March 11, 2026

Hardware-anchored τ-Chain protocol producing continuous trust scalar τ ∈ [0,1] from TPM attestation records for autonomous mission authority.

Application: 64/002,453 · Receipt: 74808459
DOI: 10.5281/zenodo.18936251
Patent Submitted

Human-Machine Authority Architecture (HMAA)

U.S. Provisional 63/999,105 · Filed March 7, 2026

Real-time authority computation engine with six-tier HMAS spectrum, hardware-gated actuator interface, and cryptographic SALM audit logging.

Application: 63/999,105 · Receipt: 74759595
DOI: 10.5281/zenodo.18861653
Active Development

Adversarial Deception-Aware Risk Architecture (ADARA)

v10.0 · Author: Burak Oktenli · Georgetown University

Proactive deception prior: A_adj = A_hmaa × (1 - λ × P_deception). Computes P(adversarial) from input anomalies, temporal correlation, cross-sensor consistency, and Bayesian mission history. Phantom Fleet detection module.

Status: Active development · Patent planned
Key Formula: A_adj = A_hmaa × (1 - λ × P_deception)
Published · MIT License

Multi-Agent Integrity Verification (MAIVA)

DOI: 10.5281/zenodo.19015517 · March 14, 2026

Byzantine-resilient swarm trust aggregation (3f+1 BFT), CUSUM-augmented detection, graduated escalation, DoDD 3000.09 action gates. 37 self-tests, TLA+ specification.

DOI: 10.5281/zenodo.19015517
Version: v5.18 · License: MIT
Patent Submitted

Flash War Latency Architecture (FLAME)

U.S. Provisional 64/005,607 · Filed March 14, 2026 · DOI: 10.5281/zenodo.19015618

Strategic Latency as engineered system. Dynamic Delay Function D(A, tier, domain), 5-state Circuit Breaker with crypto-signed transitions, Keep-Alive heartbeat protocol.

Application: 64/005,607 · Receipt: 74858888
Filed: March 14, 2026 · Version: v5.11
DOI: 10.5281/zenodo.19015618
Patent Submitted

Control Authority Regulation Architecture (CARA)

U.S. Provisional 64/000,170 · Filed March 9, 2026

Deterministic authority recovery via GREP phases I-IV with non-compensatory terminal gate. 10M-iteration verification, 68-state control-flow enumeration.

Application: 64/000,170 · Receipt: 74767602
DOI: 10.5281/zenodo.18917790
Published on SSRN

Escalation Risk Assessment Model (ERAM)

SSRN Abstract ID 6176802 · Author: Burak Oktenli

Decision-time compression analysis for AI-enabled C2 systems. Quantitative framework modeling how authority integrity degrades across interconnected multi-domain environments.

SSRN ID: 6176802 · Status: Published
View on SSRN

Interactive Technical
Demonstrations

View All Repositories

Each simulation below is a fully functional, browser-based implementation of the corresponding patent architecture or technical report. These are not mockups; they execute the actual algorithms described in the filed patent disclosures and published specifications, with real-time computation, cryptographic operations, and verifiable outputs.

Patent Architecture · Interactive

HMAA Simulation

Human-Machine Authority Architecture, Dashboard

Full implementation of the real-time authority computation engine. Includes the six-tier HMAS authority spectrum, live calculator with parameter sliders, escalation sweep analysis, EW hysteresis modeling, Monte Carlo tier distribution (n=1000), determinism proof, RTB failsafe timeline, multi-run overlay comparison, fault-tolerance analysis, uncertainty quantification, and a complete compliance audit with safety case.

Live Calculator HMAS 6-Tier Spectrum Monte Carlo n=1000 Determinism Proof EW Hysteresis Fault-Tolerance RTB Failsafe Safety Case Scenario Library Repro Bundle
Patent Architecture · Interactive

CARA Simulation

Control Authority Regulation Architecture, v1.2.2

Full implementation of the deterministic authority recovery protocol. Includes the live GREP phase calculator, adversary model analysis, 68-state control-flow replay, parameter space heatmap, and the non-compensatory terminal gate that makes CARA structurally irreducible to any utility-maximization framework.

Live Calculator GREP Phases Adversary Model Operational Replay Parameter Heatmap Assurance Matrix JSON/CSV Export
Technical Report · Interactive

SATA Simulation

Sensor Attestation and Trust Anchoring, τ-Chain Protocol

Real-time sensor attestation engine computing the continuous trust scalar τ ∈ [0,1] consumed by HMAA. Implements TPM-anchored cryptographic chain verification, Monte Carlo trust distribution analysis, FMEA/FTA fault trees, live finite state machine visualization, and DoDAF OV-1 architecture views. All cryptographic operations run in-browser using WebCrypto.

τ-Chain Attestation WebCrypto SHA-256 Monte Carlo FMEA / FTA Live FSM DoDAF OV-1 Report Export
Patent Architecture · Interactive

FLAME Simulation

Flash War Latency Architecture for Multi-domain Escalation Control, v5.11

The first technical architecture implementing Strategic Latency as an engineered system. Includes a Latency Injection Engine (LIE) middleware, the Dynamic Delay Function D(A, tier, domain), a formal 5-state Circuit Breaker State Machine (NOMINAL, CAUTION, HOLD, FREEZE, LOCKOUT) with cryptographically signed transitions, Keep-Alive heartbeat protocol with safe-mode link failure defaults, domain-tier risk heatmap, and physical interlock reset verification.

Latency Injection Engine D(A, tier, domain) 5-State Circuit Breaker Keep-Alive Protocol Risk Heatmap Crypto-Signed Transitions Interlock Reset Audit Export
Multi-Agent Trust · Interactive

MAIVA Simulation

Multi-Agent Integrity Verification Architecture, v5.18

Byzantine-resilient swarm trust aggregation extending HMAA to multi-agent environments. Implements trimmed weighted median aggregation (3f+1 BFT), three-layer CUSUM-augmented anomaly detection, graduated escalation with per-level action permissions, DoDD 3000.09 action gate classification, sensitivity analysis, WCET profiling, and a 14-tab PDR briefing package. 37 self-tests run automatically on load. TLA+ formal specification included.

BFT Aggregation CUSUM Detection 37 Self-Tests Sensitivity Analysis WCET Profiling Graduated Escalation DoDD 3000.09 TLA+ Spec PDR Briefing State Export
Deception-Aware · Interactive

ADARA Simulation

Adversarial Deception-Aware Risk Architecture, v10.0

The first proactive deception prior architecture that adjusts authority downward pre-emptively based on P(adversarial). Implements a Deception Probability Engine computing adversarial likelihood from input distribution anomalies, temporal correlation patterns, cross-sensor consistency, and Bayesian mission history updates. Deception-Adjusted Authority: A_adj = A_hmaa × (1 - λ × P_deception). Includes Phantom Fleet detection module for AI-hallucinated hostile force scenarios.

Deception Probability Engine A_adj Formula Phantom Fleet Detection Bayesian Update Cross-Sensor Consistency Temporal Correlation λ Sensitivity Mission History

These simulations implement the patent architectures and research frameworks. HMAA, CARA, SATA, MAIVA, FLAME, and ADARA execute published specifications and research architectures. All run entirely client-side with real-time computation and verifiable outputs.

Research Papers
& Policy Analysis

Patent Disclosures & Technical Reports, Published with DOI
  • 01
    CARA: A Deterministic Authority Recovery Architecture for Human-Machine Authority-Gated Autonomous Systems
    Zenodo · DOI 10.5281/zenodo.18917790 2026 Patent Disclosure
  • 02
    HMAA: An Operational AI Governance Engine for Real-Time Authority Computation in Autonomous Systems
    Zenodo · DOI 10.5281/zenodo.18861653 2026 Patent Disclosure
  • 03
    Sensor Attestation and Trust Anchoring (SATA): A Hardware-Anchored τ-Chain Protocol for Autonomous Mission Authority — Technical Assurance Report v3.8.9
    Zenodo · DOI 10.5281/zenodo.18936251 · Georgetown University 2026 Technical Report
  • 04
    MAIVA: Multi-Agent Integrity Verification Architecture — Byzantine-Resilient Trust Aggregation for Autonomous Action Authorization, v5.17
    Zenodo · DOI 10.5281/zenodo.19015517 · Georgetown University 2026 Technical Report
  • 05
    FLAME: Flash War Latency Architecture for Multi-Domain Escalation Control, v5.11
    Zenodo · DOI 10.5281/zenodo.19015618 · Georgetown University 2026 Software
Policy & Strategy Papers, SSRN

All papers publicly available on SSRN with individual permalink URLs. These are working papers, not peer-reviewed publications.

  • 06
    Decision Compression and Escalation Risk in AI-Enabled Military Command and Control: An Operational Analysis of the ERAM Framework
    SSRN · ID 6176802 2026 Policy Paper
  • 07
    The Governance of Velocity: Doctrine, Entanglement, and Risk in the Joint All-Domain Command and Control (JADC2) Era
    SSRN · ID 6083970 2026 Policy Paper
  • 08
    AI-Enabled Military Decision-Making and Escalation Risk: Human-Machine Command Authority in Great Power Competition
    SSRN · ID 6082847 2026 Policy Paper
  • 09
    Strategic Subterranean Domain Awareness: A Comprehensive Technical and Operational Evaluation of Next-Generation AI-Fused Counter-Tunnel Architectures
    SSRN · ID 6046594 2026 Policy Paper
  • 10
    The Strategic Convergence: AI Has Outpaced Human Clearance Models
    SSRN · ID 5940814 2025 Policy Paper
  • 11
    The Strategic Convergence: Risk-Adaptive AI for Reducing Insider Exfiltration and Improving Forensic Readiness
    SSRN · ID 5919022 2025 Policy Paper
  • 12
    Strategic Assessment: The Operationalization of Artificial Intelligence in U.S. Defense Doctrine
    SSRN · ID 5909983 2025 Policy Paper
  • 13
    Shadows in the Marketplace: Operational Doctrine for Project AURELIUS (AI-Driven Economic Counter-Warfare)
    SSRN · ID 5897442 2025 Policy Paper
  • 14
    The Strategic Convergence: Microreactor Technology as the Foundation for AI Hyperscale Autonomy
    SSRN · ID 5867163 2025 Policy Paper
In Process, SSRN Submitted

Submitted to SSRN, currently in preliminary upload / review status.

  • 15
    Physics-Based Analysis of Submarine Surface Signatures: Hydrodynamic Mechanisms, Detection Theory, and Countermeasure Constraints
    SSRN · ID 6233601 · Preliminary Upload 2026 Policy Paper
  • 16
    If Snowden Were an AI: Military Defense in the Age of Autonomous Intelligence
    SSRN · ID 6186118 · Preliminary Upload 2026 Policy Paper
Works in Progress
  • Energy Resilience for AI-Dependent Systems: Infrastructure Security in Autonomous Operational Environments

Professional Background

Data Solutions & Intelligence Engineer / Global Strategy Lead
2021 – 2024
Blue.Cloud · Tampa, Florida · STEM-OPT Authorized Employment
  • Engineered enterprise-grade data governance architectures with RBAC enforcement in regulated cloud environments
  • Executed cloud infrastructure risk assessments aligned with ITAR/EAR need-to-know data handling requirements
  • Developed automated data-validation pipelines for high-velocity enterprise data, reducing time-to-decision for executive operations
  • Scaled cross-functional engineering capabilities; modernized legacy pipelines with disaster recovery alignment
Infrastructure Security & Operations Strategist
2021 – 2025
SIMA, Advanced Materials & Defense-Adjacent Supply Chain · Istanbul, Turkey
  • Directed system-level security strategy for advanced materials networks across Eastern European and Middle Eastern corridors
  • Designed and implemented Zero Trust governance for ICS operating in high-velocity environments
  • Executed threat-modeling protocols, transitioning legacy infrastructure to NIST-aligned security frameworks
Strategic Intelligence & Risk Management Advisor
2023 – 2025
SADEF, Critical Agricultural & Food Infrastructure · Istanbul, Turkey
  • Conducted systemic vulnerability assessments across distributed critical food-infrastructure nodes in a NATO-allied jurisdiction
  • Authored operational continuity frameworks mitigating cyber-physical threats, mirroring U.S. CISA strategies
  • Managed cross-border intelligence flows in regulated markets under international export-constraint regimes
Industrial Systems & Data Governance Strategist
2020 – 2023
FHS, Aerospace & Precision Industrial Engineering · Istanbul, Turkey
  • Engineered data-governance frameworks for high-precision aerospace manufacturing in regulated commercial sectors
  • Deployed Data Loss Prevention (DLP) strategies to safeguard proprietary engineering data
  • Optimized manufacturing workflows through predictive risk modeling and security audits
Operations & Supply Chain Resilience Advisor
2017 – 2020
REXOIL, Critical Petrochemical & Energy Infrastructure · Istanbul, Turkey
  • Managed operational risk and supply chain logistics for a major petrochemical entity in volatile energy markets
  • Overhauled OT reporting protocols to eliminate data latency in high-velocity operational decision cycles
  • Conducted risk-informed decision support analysis to remediate systemic distribution network vulnerabilities

Technical Credentials
& Domain Expertise

Professional Certifications
  • CompTIA Security+
  • CISSP Domain 1: Security & Risk Management
  • NIST Risk Management Framework (RMF)
  • NIST 800-171 Awareness
  • NIST Cybersecurity Framework (CSF)
Executive & University Programs
  • AI Strategy (Oxford / Wharton Executive Education)
  • AI in National Security (SCSP)
  • Generative AI Governance (University of Michigan)
  • Open-Source Intelligence (Basel Institute on Governance)
Specializations & Training
  • Advanced System Security Design (University of Colorado)
  • AI for Cybersecurity (Johns Hopkins University)
  • NYU Cybersecurity Specialization
  • Cloud Computing Security (University of Colorado)
View All Certifications & Licenses (140+)

Get In Touch

Available for research collaborations, expert advisory engagements, and discussions on AI governance, autonomous systems safety, and national security technology policy.

Location

Washington, D.C. / Miami, Florida

Languages

English (Professional) · Turkish (Native) · Russian (Reading Proficiency)

Research Focus

AI Governance · Autonomous Systems Safety · National Security Technology · Escalation Risk Modeling · Human-Machine Teaming

Patent Status

HMAA: U.S. Provisional 63/999,105 (March 7, 2026) · CARA: U.S. Provisional 64/000,170 (March 9, 2026) · SATA: U.S. Provisional 64/002,453 (March 11, 2026) · FLAME: U.S. Provisional 64/005,607 (March 14, 2026) · All submitted via USPTO Patent Center, awaiting review