Nicole Villa

Writings about #cybersecurity, #cryptocurrency and other things such as #innovation

Space Poetry

Celestially placed as a naturally irrational universal being Means I live, I live among the tangible I feel, I feel the magical It’s lovely to be amongst all realms Ascending and evolving, quite sporadically in this formula. ______________________________________

I barely remember the cosmic nebulas I once called home. The star dust from my tracks, blown away. Stuck afar, I crawl to things new and strange. Trying to find familiarity when they… they… simply can’t understand. Their realm was meant for them, but why was I removed from mine? Getting called a heretic, all the time. ______________________________________

System Overload I couldn't hold on I was afraid, of everything in Its entirety. Passing through invisible doors and then real doors, How does this happen? I was asleep then awake. Traversing the possibilities of metaphysics. Waiting for existence, then knowing I was existence. Staying clear and out of the fog. I couldn't “think” and had to just do it. It got done.

Exercising Patience When Collecting Enigmatic Data

There is significance in certain data, even when its value is misunderstood or entirely invisible to its owners. It's power lies in its potential future value. This denotes the importance of collecting such data based on one's instinct.

people in corporate meeting arguing

In 2018, I had my first encounter with enigmatic data while collaborating with two Chicago blockchain developers on a spreadsheet for a project. There came a moment when we collectively realized that the data we were seeking simply didn't exist yet, leaving us in a state of awe and wonder.

developers working near whiteboard

Over time my project evolved, and I was focused on relocating. I reached out to the City of Austin because they are extremely forward-thinking and prepared to incubate innovation. I also suspected from our conversations they might have an in-house researcher in their chamber of commerce because I discovered that the metrics I sought were not being monitored; prompting the realization that this data should have been tracked for years.

This revelation for the City of Austin came shortly before the pandemic. Another situation emerged within a different entity: EdWeek, a mission-driven non-profit deeply committed to driving the future of education forward. Amid the COVID-19 crisis, the government approached this organization due to their data collection efforts that should have been the government's responsibility. Many likened the handling of COVID across government systems to the 9/11 moment for the American healthcare system.

Here's the e-mail EdWeek sent out during the COVID-19 emergency.

screenshot of email

The most important part of the email is one of the last lines which got cut off, “And sometimes it means collecting important data when nobody else is.”

What are some reasons behind the non-collection or removal of data?

  • Data often goes uncollected or is purged due to human reactions. This can stem from fear or discomfort towards specific types of data, contributing to the existence of data gaps and stigmas.

  • There are associated costs of storing it, even if people want to preserve it. A friend who is an artist and involved in a technical movement comes to mind.

  • A training issue: if people don't know how to properly store it, non-technical, or hobbyist.

  • It challenges the status quo and competition realizes it when it's too late; or competition is quick to detect when this data starts to trickle out publicly.

  • The data disrupts the holder's own business model or gets them in trouble for wrongdoing. This gets into a deny and delay tactic that hinders the ability to put emotions aside and potentially lets the problem blow up in their face. Either way, confrontation delayed is problems compounded.

Click here to find out the difference between a snafu, a shitshow, and a clusterfuck

As I've created a YouTube channel Invulnerable Creators our tagline is, “If the best work of your career is dangerous, controversial, or uniquely different you might be on the right path.” We focus on hosting educational content such as tech coding tutorials and audiobooks. The author of the book we've been formatting into an audiobook is an MIT graduate, a founding officer for Space Force, and an aeronautical engineer. Yet, we did not anticipate the author's book to become removed from the Amazon bookstores, Google's Bard, MIT's online free library, and Air University.

Currently, in the back of my mind I have to wonder if my channel will suffer ramifications for hosting the data from the book in audiobook and video formats.

I choose to host the audio and video form of a banned book on my YouTube channel because I do not know the ramifications of failing to host it. Nor do I intend to find out the cost.

content removed error page is similar to image of people standing around bonfire burning books in the past

If any of you have seen the movie Oppenheimer recently, one should consider the true cost of Nazi Germany's treatment of Quantum Relativity as Jewish Technology.

Relentlessly pursuing big questions, no matter the cost, often paves the way for groundbreaking discoveries.

You can even make the case that unhealed or pathologically unfixable (sociopathy, dark-triad traits, psychopathy) personal biases can leave many living in a world of absolutes. Those limitations are the ones that cost majorly in the long run.

Even if that is not the case, it's always simply a communication issue. As my favorite saying pertaining to this goes, “Human problems (emotions) are not an engineering problem.” We connect via communication whether verbally, or non-verbally. Sometimes, stating things in my native “to the point” manner can come across as rude, especially online. Detecting tonality is challenging. The best example was when I was simply stating a fact and not using an intimidation tactic.

One of history's worst communication errors was the Challenger disaster due to O-rings failing. The primary moral issue was a lack of communication between managers and a poor safety culture, hindering proper technology testing. The key structural issue in the business was the absence of a proper safety culture.

The Next Frontier in Sales: Exploring the AI Advantage

  • Internet and information give buyer unfair advantage: The buyer has spent more time researching what they want, and the salesperson is primarily trained on their company's products and is under a time constraint. This means the transaction is very asymmetric information-wise.
  • The way sales is done is heavily on marketing through social media (networks of intelligence): The only thing sales engineers should be focusing on are warm leads or hot leads, cold calling sparingly.
  • AI is coming, and our value chain of trust has changed dramatically.
  • Depends on the kind of the sales as well. If it's low-ticket items, you don't need a sales rep (Avon or Mary Kay) but Network Marketing exists because it's effective group psychology-wise.
  • Main challenges that AI can overcome : AI can know the state of the buyer and managing their state to remain in control of the sales experience. The companies that come to mind are are Paradox.AI and Crystal Knows (DISC).

The best sales experience I ever had comes to mind, where the guy acted more like a concierge than the driver of the sale. Type A people very much appreciate this. Either way, people who are highly specialized need to feel that there is some knowledge parity going on. Unless the salesperson is specialized in high-end items of a company and they know their products in a technical way that might close a sale, it's hard for most salespeople to reach this level. It usually means the company hired someone with previous industry experience where the time in the field is there advantage.

In high end sales this begets another question about their training level. Do most sales reps have negotiation skills on par to someone who is a lawyer or people who do the majority of high-end purchases? People in certain industries have advantages (tech, medical, finance).

#sales #cybersecurity #ai #thefutureofsales #innovation

Cybersecurity Humanitarian Work

Skull Games is an event held by All Things Possible (ATP). At this event leads on human traffickers and missing women are researched and packaged into actionable leads for law enforcement agencies. ATP has a “Victims to Victors” program where survivors of sexual exploitation are trained into OSINT analysts.

What is OSINT?

OSINT is Open-Source Intelligence. OSINT is used by intelligence agencies, law enforcement, businesses, and individuals to gather information and gain insights into a wide range of topics.

How do they do this?

Skull Games uses OSINT tools (there is no hacking allowed). ATP recommends volunteer submissions from mainly the intelligence and cybersecurity fields. Although people interested in the event who have no background in this kind of work can take an OSINT course through Echo Analytics Group and then submit their resume.

As someone transitioning to cybersecurity from a cryptocurrency and coding background, I signed up to participate in person at Skull Games 6 in Tampa, FL.

Prepping for Skull Games

First off, I submitted my application and consented to the mandatory background check. It was obviously approved, or this article wouldn't exist.

We were given two virtual trainings before the event and a packet with mandatory readings and assignments to bring to our virtual trainings. I chose to attend in-person because I've done remote-first work before it was common during the pandemic. There's just something different about being in-person if you can be there.

It was recommended to have a dedicated laptop for OSINT. You don't have to do this, but I did.

They tell you all the requirements or recommendations for doing the research on our persons of interest. I made sure to try have all my bases covered as I'm still fairly new to the cybersecurity sector.

Expectations wise? The trainings and response from the team when emailed were really professional and timely. Other than that, I had no clue what to expect. I just had to show up and find out!

The Meet & Greet

On Friday night before SG6 began we met up at Bahama Breeze to mingle with everyone flying in! Honestly, some of the most interesting people I've ever met were there. This is exactly the reason I attend events in person if I can! Because of in-person events it's how I heard of Bitcoin at $400 and Ethereum when it was 8 months old. I absolutely place a high emphasis on in-person events.

So, this event was no different. One of the people I met was initially blamed for the Colonial Pipeline Cybersecurity Hack. Long story short, he was doing consulting work the month before with a very powerful agency on the subject of securing our energy grid. Then, I was told one of the most powerful women in cybersecurity in maybe the world was here.

{ Go 👏 to 👏 more 👏 events ! }

Day 1

sg1

sg2

There were personal delays before the event such as finding out I need a surgery. So planning for that was important. If it weren't for that I wouldn't recommend trying to set up your OSINT computer the same day of the event.

  • Shuttle to workspace
  • Morning meeting
  • Set up accounts for researching
  • Downloading tools for OSINT
  • Wifi was cutting out during the event
  • This event had a record number of people in person and online trying to log on to the investigation platform, so our cases were emailed to us
  • Went to Best Buy to see if there was an issue with the laptop (it was the wifi)
  • Finding information on persons of interest
  • Internet Issues
  • End of day meeting

Let's be clear, the people who run this event are professionals. I don't think they would have chosen this venue if they knew they would have these issues. I didn't bring my own wifi hotspot or any cables to hardwire in. They chose a headquarters for a fast food chain, which means one assumes that business-level and large-group wifi needs should be met with minimal issues.

Despite the hiccups of the day, it was still an extremely valuable day. The leaders determined immediately how to make future events better. Skull Games events have only been going on for about a year. It's been their ten-year overnight journey and it's still at the beginning of the execution phase to get this event to the level they want it to be.

Day 2

  • Group picture
  • Morning presentation
  • Logged into the investigation platform
  • Ability to get more information on persons of interest
  • Analysing the data on images
  • House address was in one photo
  • Talked about specialized databases and technology to use which is honestly incredible (found out one of the women in our group was a geOSINT expert who had done some light investigative work on the Epstein case)
  • Found one person of interest's mixtape and honestly one post was pretty sad
  • Made more progress on the case and sent presentation over to the group leader
  • End of day and event meeting

sg7

The biggest realization of the event was when on a Instagram story the person of interest shared some song lyrics from NBA YoungBoy's Foolish Figure. There was a picture of his son he may have had with one of the women he was selling and these lyrics were right over the son's face.

“They tell me I'm a star, I'm just a foolish figure It seem like I'm strong but I'm really broke down I'm happy that I'm winnin' but ain't proud of myself Lookin' for this bitch to love me but ain't lovin' herself Got these nixxas and the police trackin' me on my trail”

How fitting for the case I was working on. Then I shared these lyrics with the group right?

Then I clearly got philosophical as I usually do.

“You know what this means? It's a Freudian slip. This guy knows that he's living a lie and he's just continuing to lie to himself.

People want to make their problems sound so complicated but if you understand emotions, it's not that complicated. Emotions are not engineering problems.

Most people are willing to lie to themselves than face the truth.

That's it, this guy and most of these people do not genuinely know what success looks like.”

Plain, simple, and not complicated.

The average earning power of a drug dealer or a pimp after damages done to their reputation, court fees, and everything else is minimum wage or lower.

A video about how most people are just lying to themselves more than anyone else.

View this post on Instagram

A post shared by Daniel G (@danielg)

After that, we were leaving the building and many people were heading to the airport with the shuttle.

It was here I got into an Uber with a man who worked on tracking John McAfee's financial data from working in D.C. This is why I emphasize in-person events. It's where the most hardcore movers and shakers in any field are!

This came up because we were sharing how we got into cybersecurity. I got in through cryptocurrency and attended events around the U.S and internationally. One of those events was when I was set to see John McAfee talk at a conference in Las Vegas. It happened to be the conference where an attempt was made on his life. It was one of his last public events in the U.S.

I was kind of wary that he had a “medical issue” as was told to the crowd with him calling in from “the hospital”. Later we found out he could not go to the hospital. He went to a safe house where a doctor gave him medical care there or he would have been apprehended by the authorities. In the crowd the guy next to me was partying with McAfee doing drugs with him the night before.

Then I got into how someone I was formerly friends with (common theme with crypto folks as this guy was still in contact with the crypto CEO who hacked me) got one of the last interviews with McAfee before he was arrested off the coast of Spain. McAfee showed the faraday cage he created on his boat in this interview. Unfortunately, one of the hackers who was trained by McAfee is a huge crypto trading scammer who after Aaron Carter's death was trying to grift Carter's estate. Not shockingly, the FBI came to this man to tell him there was a hit out on him. 🙄

Enough about that, but that's how it ended for me. Well, I stayed for two more days as I don't like rushing anymore with travel. I got to try some exotic fruit with some baristas. Didn't want to throw out the other two I wasn't using. I had 4 of these exotic fruits that even most people in Florida didn't know the name of. They were lemons with lime-colored stretch marks on them, and pink on the inside and smelled like perfume but sour when eaten.

#osintforgood #cybersecurity #tech #skullgames

Eden Had No Privacy

Written by Cybersecurity Analyst Dr. Charles Awuzie (Inspiration drawn from the biblical story of Adam and Eve).

Despite the beauty and glory of Eden, it couldn't support marriage. Yes, Adam and Eve were forced to pack out of Eden in order to continue with their marriage. At a friend's wedding, a preacher mentioned that Adam yielded to Eve and had a bite of the forbidden fruit because he wanted to save his marriage. According to him “had Adam not eaten the fruit too, only Eve would have been driven out of Eden and that would have been the first separation. But Adam chose his marriage over the beauty of Eden.”

“So what is it about Eden that nearly destroyed the first biblical marriage?”

This question has lived in my mind for over many years until recently, when I logically analyzed the problem of Eden. The beautiful garden had no PRIVACY.

Every animal could walk in and out of Eden. Even the crooked serpent had no restrictions of movement in Eden. Adam failed to build boundaries. He failed to secure the privacy of his home. So one day, while he was busy at work, the figurative serpent took advantage of the porosity of Eden and penetrated his wife.

I believe that the serpent in that Story is figurative. It represents Third parties who suggest strange thoughts to you in the absence of your spouse. There are people who suggest strange thoughts to your partner in your absence – some suggest that you are cheating and that they should investigate you. Those are the serpents that crept into Eden.

I am writing specifically to married people and the soon-to-be-married. Wealth, beautiful home and a good job will not secure your marriage. Adam had wealth, he had paradise as home and had a good job yet his marriage was at the mercy of a serpent.

Ireti Doyle and her husband Doyle had wealth, a beautiful home etc yet Ireti confessed that her marriage was simply a perfect picture but an ugly reality. At the bottom of every destroyed marriage is the voice of the serpent. The serpent now speaks through Social Media feminists and YouTube Misogynists. There are now more Influencers influencing you from their dangerous misogyny or extreme feminism.

Beware of such.

I want to speak more specifically to someone whose marriage is at the mercy of a crooked serpent. You know that the problem in your marriage is the handwork of a third party who hijacked the mind of your partner. It could be their friend or even a total stranger who gained access to their vulnerability. And now, your partner is feeding you the same junk with which they were fed. Don't blame your partner, blame yourself. You failed to secure your territory. That was Adam's first mistake – he failed to create a boundary between his new family and the animals. That's the mistake some of us are making also – you are failing to build a fence around your family to keep dangerous 'animals' away. Hear This: Prayer or Crying can not secure what you expose.

From the day I understood the porosity of Eden and the principle of privacy, my life has never been the same. I enjoy REST – the kind of REST that only comes from SECURITY.

There's someone who is reading this post who needs to set boundaries. You need to put a stop to people asking you unnecessary questions about your spouse. Beware of Questions like “when will your husband/wife get a job and help in paying bills?”. Respond to such with “How is that your business?”. Do not be kind with people who ask insensitive and disrespectful questions about your partner.

And do not over share your marital bliss or chaos on social media. Whether you are happy or unhappy in your marriage, keep it away from the public.

Do not use your marriage to “Pepper Them” on social media. And if you break up, just do it quitely without noise. I know a friend of mine who got divorced 5 years ago and never said a word. He tried another relationship but didn't succeed and he went back to his wife quitely. Had he announced his divorce publicly, it wouldn't have been easy re-marrying his ex wife. Today, they are happy and rebuilding privately. You don't owe anyone updates about your marriage or relationship.

Had Adam encountered a post like this, he would have secured his home portal and the serpent that deceived Eve would have died without executing his evil plans.

I don't mean to scare you but if you don't take the privacy of your home serious, you risk losing your paradise. I know people who used to live in Paradise before who now hide under 'trees' for shelter because they allowed a serpent to manipulate the mind of their partner.

Wherever there's an eve, privacy and security is vital. Because every Eve is an expensive treasure desperately searched for by both men and beasts. Even on social media, we don't run an open door policy.... We are CAREFUL and INTENTIONAL. That's why I Block people who display serpentine character here.

Eden had no privacy. Adam had no boundaries – don't be like Adam. Set boundaries and enforce privacy.

Remember, the success of a marriage is not a function of the paradise you live in but the boundaries you set.

My name is Dr. Charles Awuzie and I set boundaries!

Enter your email to subscribe to updates.