Portfolio

Portfolio: Selected Concepts & System Architectures (Open Source)

These presentations are concept-level demonstrations of my thinking: cross-domain integration, threat-modeling, and system architecture under real-world constraints. I work primarily as a strategic “system engineer”: I connect existing technologies, physics, logistics, and human factors into new operational concepts that can be evaluated, stress-tested, and developed by an organization’s internal teams.

For security and legal reasons, this public material remains high-level. Detailed designs, trade studies, and mission-specific adaptation are available only through direct engagement and appropriate confidentiality arrangements.

Hardened Underground Facilities: When Penetrators Aren’t Enough (Concept Study)

Summary

This talk analyzes the core problem of deep underground facilities protected by hard geology—and why conventional “bunker buster” assumptions can break down when the target is beyond practical penetration depth. It frames the challenge as a system problem (geology + structure + physics + operational constraints), and argues for exploring non-traditional pathways to create decisive effects when direct penetration is not feasible.

What this demonstrates

  • Strategic problem decomposition under hard constraints (depth, geology, current munitions limits).

Using environmental/physical context as part of the “system,” not just the target structure.

Munchausen Gun: Man-Portable Counter‑UAS With Passive Detection (Concept)

Summary

This concept starts from an uncomfortable reality: many counter‑UAS options are either too expensive, too fragile, or don’t solve the hardest part—rapid detection and cueing in cluttered environments. The approach emphasizes passive detection (hearing/observing rather than broadcasting) and a practical soldier-level defeat concept designed for real field conditions where jamming, decoys, and saturation exist.

What this demonstrates

  • System-level thinking: detection, cueing, engagement, and battlefield practicality treated as one chain.

Focus on the “weak link” (target acquisition) rather than just the interceptor.

Project Zet: Resilient Counter‑UAS Architecture (Distributed, Redundant, Hard to Break)

Summary

Project Zet is a critique of “single expensive battery” thinking in air defense: when defense is built as a thin line, one failure point can create a gap and collapse the whole concept. The alternative proposed here is a distributed architecture that bakes in redundancy at multiple layers (physical deployment, command/compute structure, and unit replacement), with continuity concepts inspired by handoff/handover in cellular networks.

What this demonstrates

  • You don’t “buy a weapon,” you design a survivable system under enemy adaptation.
  • Redundancy as strategy (not as an afterthought).

Practical security concerns: compromise resistance + staged trust/promotion logic.

Subterranean Rescue & Asymmetric Warfare: “Army‑Ant” Drone Ecosystem (Concept)

Summary

This presentation proposes a shift from heavy-platform thinking to a drone-centered operational paradigm for subterranean conflict and hostage scenarios—where the enemy’s advantage is concealment, connectivity, and terrain. The “army ants” metaphor is used to describe multiple drone roles working together (not just a single drone doing ISR or a single drone dropping a munition), with the goal of mapping and understanding a tunnel network and acting with far fewer friendly casualties.

What this demonstrates

  • Integrating existing tools into a new operational concept (“new paradigm of warfare”).

Systems thinking under moral/operational constraints of asymmetric warfare.

Deep Tunnel Networks: Seek–Map–Neutralize (Concept Framework)

Summary

This concept treats deep tunnel warfare as a two-stage problem: (1) mapping and understanding the underground geometry, followed by (2) neutralization based on structural and physical vulnerabilities. A key point raised is that subterranean layouts behave differently than classic trench systems—so doctrine borrowed from surface warfare can miss critical dynamics underground.

What this demonstrates

  • Turning an “impossible” operational problem into stages with testable sub‑problems.

Using geometry/structure as an exploitable part of the system (not just “drop bigger bombs”).

Mur’al Without Poison: Soldier Health as a Defense Readiness Problem (Open Investigation)

Summary

This work reframes a medical issue as a force-readiness and safety engineering problem: Israeli combat veterans show significantly elevated ALS risk, with especially high risk in specific roles. The document proposes testable exposure hypotheses tied to modern equipment and environments, alongside near-term mitigation steps and a longer research roadmap—designed to be actionable rather than purely academic.

What this demonstrates

  • Cross-domain synthesis under urgency: tech specs + toxicology + field reality + research design.
  • A “systems engineer” mindset applied to biology: identify suspects, propose measurements, propose interventions.

(Note: This is not personal medical advice; it’s a concept and research/mitigation proposal.)

Anti‑Missile + Anti‑Tunnel: Distributed Sensing & Decision at the Edge (Concept)

Summary

This concept connects two hard national-security problems—missile threats and underground tunnel threats—under one organizing idea: many small sensors working as a network can sometimes outperform a small number of exquisite systems, especially when the enemy uses saturation, low observability, or terrain masking. It proposes an edge-driven approach where sensing and decisions happen in the field as a coordinated system, rather than relying only on centralized detection.

What this demonstrates

  • Unified thinking across domains: aerial threats and subterranean threats treated with the same network logic.

A bias toward robustness and graceful degradation (systems that keep working when parts fail).

Similar concepts later appeared in public literature after I shared early versions privately.