Securing America

Cybersecurity Expertise Built on 37 Years of Professional Excellence

USAF Veteran. CCIE #14019. Conservative voice on national security, critical infrastructure protection, and the real threats America faces — from someone who has actually done the work.

37 Years of Professional Excellence: 25 Years Cybersecurity, 12 Years Military Service

I've spent 25 years in the trenches of cybersecurity and network engineering, combined with 12 years of military service in USAF network operations. That's 37 years of experience defending America's critical infrastructure. I've seen what works, what fails, and what our government gets dangerously wrong about defending America's networks.

This isn't theory. This is from someone who has actually secured SACDIN networks, managed AWACS systems, and worked with JCSE on critical infrastructure protection. I bring a practitioner's perspective to cybersecurity policy, military readiness, and national security.

I'm also a published author on emerging technologies, AI security, and blockchain infrastructure — and I'm not afraid to say what others won't.

25+ Years Experience
CCIE #14019 Cisco Certified
USAF Veteran
20+ Published Books

Where I Focus

Deep technical expertise combined with policy insight — because cybersecurity isn't just about technology, it's about defending America's interests.

China Cyber Threats & Critical Infrastructure

Salt Typhoon, Volt Typhoon, Silk Typhoon — understanding what the Chinese Communist Party is actually doing to America's networks. Critical infrastructure security, telecom hacks, and what our government is missing.

ChinaTelecomInfrastructureAPT

Military Policy & Veteran Advocacy

VA healthcare reform, military cybersecurity workforce development, veteran transition to tech careers, DoD network security posture — from someone who has lived both sides of the military-civilian divide.

USAFVA ReformDoDTransition

AI & Emerging Tech in Security

Artificial intelligence in cyber warfare, autonomous systems security, the policy implications of AI-enabled attacks, and what the government is getting wrong about regulating emerging security technologies.

AI/MLAutonomousPolicyWarfare

Cybersecurity Policy & Legislation

Reading the actual text of cybersecurity legislation and explaining what it really does — not the press release version. CISA mandates, NSA guidelines, Congressional proposals, and executive orders decoded.

CISANSACongressExecutive

From the Front Lines

Cybersecurity analysis, military policy advocacy, and conservative commentary — from a practitioner's perspective. Follow on X for daily posts.

Cybersecurity Analysis

The media is calling the latest Chinese telecom hack "sophisticated." As someone with 37 years of professional experience — 25 years in cybersecurity and network engineering, plus 12 years of military service — let me tell you what actually happened — and why our government's response is completely backwards.

Veteran Policy

Congress just passed a VA reform bill. I read the actual text so you don't have to. Here's what it actually does, what it gets right, and the one provision that will make every veteran cringe.

National Security

TikTok isn't just a social media app. It's a data collection operation with direct ties to the Chinese Communist Party. Here's the technical reality that the debate keeps missing — from someone who understands the architecture.

Live on Amazon Kindle

Making complex cybersecurity and technology concepts accessible — to practitioners who need to implement them, to policymakers who need to regulate them, and to citizens who need to understand them. All titles available now on Amazon Kindle.

20+Published Books
25Years Experience

Network Automation Fundamentals

Stop fighting your network. Start automating it.

View on Amazon →

Agentic Debt: Infrastructure Crisis Behind Autonomous AI

Critical infrastructure gaps in autonomous agent deployment

View on Amazon →

Mainframe Integration Hell: Banking & Blockchain

Bridging 50 years of banking infrastructure with blockchain

View on Amazon →

Crypto Regulation & Compliance Guide

Navigate IRS Rules, Form 1099-DA, and Stay Compliant

View on Amazon →

MEV Protection for Crypto Users

Stop Getting Front-Run, Sandwiched, and Extracted

View on Amazon →

Breaking into Web3: Security Professional's Guide

Blockchain career building from a security perspective

View on Amazon →

Built by a Practitioner

Security tools built from real-world experience — not theory. When AI agents started getting access to production systems, I built the kill switch.

$KILLSWITCH
Runtime Fence — Because every AI needs an off switch.
Production Ready Python 3.11+ MIT License Sub-100ms Kill

Universal AI agent safety control — an emergency kill switch for ANY AI agent. As AI systems gain access to production infrastructure, trading accounts, and sensitive data, the question isn't if something goes wrong. It's when. Runtime Fence wraps any agent with real-time action validation, spending limits, audit logging, and an instant kill switch that fires in under 100 milliseconds.

Instant Kill Switch (<100ms)
Action & Target Blocking
Spending Limits
Cryptographic Audit Log
Email / SMS Alerts
Offline Mode — No API Required
Risk Scoring (0–100)
Cross-Platform (Win / Mac / Linux)
# Install in seconds
pip install runtime-fence

from runtime_fence import RuntimeFence, FenceConfig

fence = RuntimeFence(FenceConfig(
    agent_id="trading-bot",
    blocked_actions=["withdraw", "transfer"],
    spending_limit=1000.0,
    blocked_targets=["wallet_private_key"]
))

# Emergency stop — fires in <100ms
fence.kill("Suspicious behavior detected")
<100msKill Response
68Commits
MITLicense
PyPIPublished
6Core Modules
Works With
LangChainAutoGPTGitHub CopilotCursorAiderCrewAIBabyAGITrading BotsEmail BotsWeb ScrapersData AnalystsCustom Agents
MCPShield
AI Agent Security Platform — Discover and secure MCP servers across your organization.
MVP Complete FastAPI + Next.js MIT License

As AI agents — Claude, Cursor, Windsurf — increasingly use MCP (Model Context Protocol) servers to interact with filesystems, databases, and APIs, most organizations have zero visibility into what's running. MCPShield automatically discovers every MCP server on your machines, scores each one for risk, and surfaces everything in a centralized dashboard. Multi-tenant, real-time, and built for enterprise.

Automatic MCP Discovery
Risk Scoring per Server
Centralized Dashboard
Multi-Tenancy
Real-time Status Tracking
Win / Mac / Linux Agent
# Install the agent
cd agent && pip install -e .

# Configure with your API key
mcpshield configure --api-key mcp_sk_YOUR_KEY

# Scan for MCP servers on this machine
mcpshield scan
5Core Features
3Components
MITLicense
MVPStatus
Discovers MCP Servers Used By
Claude DesktopCursorWindsurfVS CodeCustom MCP ClientsEnterprise AI Deployments
Mondoshawan
Post-Quantum AI-Native Layer 1 Blockchain — Built with Rust for the post-quantum era.
Testnet Live Rust 1.75+ QMON EVM Compatible

Mondoshawan is a next-generation Layer 1 blockchain built from the ground up for the post-quantum era. Using NIST-standardized ML-DSA (Dilithium) signatures, GhostDAG parallel block consensus, and a novel TriStream mining architecture that splits rewards across GPU, ASIC, and ZK Proving hardware — it's designed to survive both quantum computing attacks and the centralization pressures that have plagued every major chain. Full EVM compatibility means existing Solidity contracts deploy without modification.

Post-Quantum (ML-DSA/Dilithium)
GhostDAG Consensus
TriStream Mining (GPU/ASIC/ZK)
Full EVM Compatibility
Horizontal Sharding
50% Fee Burn / Deflationary
AI Security Layer
MetaMask Compatible
# Build and run a node
git clone https://github.com/dev-mondoshawan/mondoshawan.git
cd mondoshawan/mondoshawan-blockchain
cargo build --release
cargo run --release --bin node -- --port 9090 --single-stream

# Connect MetaMask: Chain ID 1338 | RPC http://localhost:8545 | Symbol QMON
274Commits
1BQMON Supply
1338Chain ID
Rust70% of Code
4Contributors
Tech Stack
Rust 1.75+GhostDAGrevm (EVM)Post-QuantumBlockchainNIST ML-DSA

Let's Connect

Reach Out

Have a question about cybersecurity, national security policy, or want to discuss a project? I'm always interested in connecting with practitioners, policymakers, and patriots who care about defending America.

Send a Message