Deepfakes, Doppelgängers, and the Digital Divide: Fraud's New Frontier

 

Shadows of Deception: Lessons from the Unseen

Fraud thrives in the shadows—exploiting the gaps we fail to see and the vulnerabilities we don’t defend. Whether it’s the silent artistry of deepfakes, the parasitic schemes of digital middlemen, or government systems hemorrhaging billions to fraud, one truth remains constant: what you don’t see can destroy you. This week, we dive into the unseen corners of deception, arming you with the insight to anticipate, adapt, and act.

In this week's issue:

  • The Doppelgänger Deception 🤖👥: Deepfakes, dark web identities, and the chilling evolution of fraud.

  • The Honey Trap 🍯💻: How PayPal’s coupon empire stings influencers and businesses.

  • Abraham Wald Reloaded ✈️📊: The invisible lessons from WWII’s missing planes and what they teach us about fraud prevention today.

  • Criminal Wisdom 🕵️📚: A sharp look at Sir Arthur Conan Doyle’s philosophy and its relevance to detecting deception.

  • The Fraudfather’s Take: Why surviving the surface isn’t enough—protecting what matters means fortifying against the unseen.

Deception evolves, but so must your defenses. Let’s uncover the hidden truths and take control of the narrative.

“Behind every great fortune lies a great crime.”

Honoré de Balzac

Government fraud is the crime everyone funds but no one sees. As mentioned last week, between $233 billion and $521 billion hemorrhages annually from federal coffers—an amount staggering enough to bankroll both Social Security’s deficit and the Department of Homeland Security, with a surplus left to cater a few G7 summits. Yet the audacity of this theft isn’t in its scale but in its banality. Fraudsters don’t wear ski masks; they don’t even leave fingerprints (not physical ones anyway). Instead, they exploit a maze of bureaucratic vulnerabilities, quietly siphoning billions like whispers disappearing into the wind.

Take the pandemic, that global stage for human resilience and rapacity alike. While society clapped for health workers, fraudsters were busy conjuring "perfect" stolen identities, overwhelming unemployment insurance systems. In some states, the claims exceeded the workforce itself—a surreal mockery of logic and oversight. Fraud became an open secret, a game of cat and mouse where the government, arms tied with red tape, could barely keep pace.

But fraud doesn’t thrive in isolation. It feeds on systemic inertia. Most agencies, hamstrung by outdated methods and an allergy to probabilistic stops, default to the clumsy “pay-and-chase” strategy. By the time the chase begins, the fox is long gone, leaving behind not tracks but echoes. The private sector has outpaced government by adopting predictive analytics and assuming risk to stop fraud before it happens. Banks tolerate false positives—an occasional call to a customer verifying a transaction—as the price of vigilance. Governments, terrified of offending taxpayers, prefer to hemorrhage cash quietly.

Yet there are glimmers of redemption. The IRS, that perennial punching bag of American frustration, waged its own war on fraud in the 2010s. By creating an analytics center of excellence and leaning into AI-driven models, the agency slashed identity fraud losses by $2.7 billion in just one year. It wasn’t magic—it was leadership, investment, and the willingness to confront unseen losses instead of coddling visible inefficiencies.

The lesson here isn’t subtle: fraud is the tax we pay on apathy. To reclaim public funds, we need systemic overhaul, not performative reforms. Agencies must adopt multi-layered defenses akin to private banks—real-time anomaly detection, cross-agency data fusion, and an unapologetic embrace of probabilistic enforcement. As McKinsey notes, the potential ROI on such efforts is staggering—up to 50:1 in some cases. The only question is whether there’s the will to invest in the unseen before it swallows what’s visible.

Fraud is less a story about villains than it is about systems—ones that refuse to see what isn’t obvious, and in doing so, leave their flanks exposed. The fight against fraud, like the fight against entropy, is endless. But it’s one we can’t afford to ignore, unless we want our future built on a foundation of silent theft.

The Fraudfather

FRAUDSTER(s) OF THE WEEK

The Rug Pull Racket—A $22 Million Mirage

Indictment Spotlight: Gabriel Hay and Gavin Mayo

This week’s fraudsters (allegedly) come straight out of a Silicon Valley-meets-Grifters Gone Wild playbook. Federal prosecutors have indicted Gabriel Hay, 23, of Beverly Hills, and Gavin Mayo, 23, of Thousand Oaks, for their alleged role in a $22.4 million cryptocurrency “rug pull” scheme spanning three years. According to the U.S. Attorney’s Office, the duo capitalized on the NFT boom by orchestrating multiple fraudulent projects, including Vault of Gems, Faceless, and Clout Coin, before vanishing with investor funds.

The indictment paints a picture of meticulously crafted deceptions: Hay and Mayo allegedly provided elaborate “roadmaps” and promotional campaigns to lure victims, claiming revolutionary innovations like “NFTs pegged to hard assets.” Once the money rolled in, the pair reportedly disappeared, leaving investors with nothing but broken promises and empty wallets.

Even more brazenly, when confronted by a project manager on one of their schemes, Hay and Mayo (allegedly) launched a harassment campaign targeting the whistleblower and their family. If true, this behavior exemplifies a scorched-earth approach to fraud—maximizing both financial gain and emotional devastation.

Both men are presumed innocent until proven guilty, but if convicted, they face up to 20 years in prison for each wire fraud count and another five years for stalking.

Advanced Defense Tactics: Outsmarting the Digital Mirage

For the savvy fraudsters among us (my audience), recognizing and defending against rug pulls like these isn’t about basic cybersecurity hygiene—it’s about mastering the art of critical discernment and implementing sophisticated countermeasures.

1. Demand Real Transparency, Not Performative Roadmaps

Rug pull scams thrive on the illusion of legitimacy. Look beyond glossy marketing materials and impressive-sounding “roadmaps.” Insist on verifiable partnerships, audited code, and independent third-party reviews. If a project promises something too innovative to fail, question why its claims haven’t been validated by credible industry players.

2. Employ Blockchain Analysis Tools

Leverage blockchain forensics platforms like Chainalysis or CipherTrace to scrutinize transaction patterns associated with project wallets. Sudden, unexplained transfers to private wallets are a red flag for imminent abandonment.

3. Verify Team Identities with Advanced OSINT

Use open-source intelligence (OSINT) tools to vet the identities of project founders. Cross-check LinkedIn profiles, public records, and social media footprints. If their digital presence is minimal or overly curated, they may be hiding behind pseudonyms to evade accountability.

4. Engage in Social Sentiment Analysis

Monitor project-related Discord channels, Reddit threads, and Twitter activity for signs of discontent. Often, early skeptics spot inconsistencies before they escalate. Pay close attention to deleted comments or restricted access to discussion forums, as these may signal damage control by bad actors.

5. Push for Smart Contract Transparency

If you’re investing in an NFT or token project, demand access to its smart contract. Ensure it has been audited by reputable firms like CertiK or Hacken, which can identify hidden backdoors or exploitable vulnerabilities.

6. Adopt a Zero-Trust Approach

Treat every new project with suspicion until it proves its credibility. Diversify investments and never commit funds you can’t afford to lose. Remember: decentralization doesn’t absolve investors of due diligence—it demands more.

The Laws of Power, Weaponized

Hay and Mayo’s alleged schemes are a masterclass in The 48 Laws of Power—albeit applied to nefarious ends.

Law 27: Play on People’s Need to Believe

The promise of “hard asset-pegged NFTs” exploited investors’ desire for stability in the chaotic world of digital assets. By playing to their aspirations, Hay and Mayo made believers out of skeptics.

Law 3: Conceal Your Intentions

Falsely identifying others as project owners allowed the defendants to hide their involvement, insulating themselves from scrutiny until it was too late.

Law 32: Play to People’s Fantasies

The allure of innovative NFT projects tapped into the collective fantasy of crypto riches, rendering investors blind to glaring red flags.

As Robert Cialdini might argue, the pair weaponized reciprocity by creating the illusion of exclusive opportunities and authority by crafting convincing personas. Their schemes are a reminder: in the high-stakes world of crypto, trust is often the first casualty.

The Fraudfather's Take:

Cryptocurrency often takes a beating in the court of public opinion, derided as the playground for money launderers and fraudsters. While it’s true that crypto offers certain conveniences to bad actors—instant transfers, pseudo-anonymity, and global accessibility—it’s far from the perfect crime tool it’s often painted to be. The reality is this: money laundering isn’t about the unit of exchange; it’s about the act itself.

Whether it’s Bitcoin or bundles of cash stuffed in a suitcase, the mechanics of laundering—obscuring the origins of illicit funds to make them appear legitimate—remain fundamentally the same. In fact, traditional currencies still dominate global money laundering schemes, from offshore accounts to shell companies and art auctions. The Financial Action Task Force (FATF) estimates that 2-5% of global GDP—roughly $800 billion to $2 trillion—is laundered annually, and the overwhelming majority of that doesn’t involve crypto at all.

Crypto’s pseudo-anonymous nature, while convenient for initial obfuscation, has a double edge. Blockchain transactions are inherently traceable—etched in digital stone for anyone with the right tools to see. Sophisticated blockchain forensics have made it increasingly difficult for criminals to hide. Traditional money laundering, by contrast, thrives on opaque systems and institutional blind spots. So, the criticism of crypto as uniquely dangerous often feels more like scapegoating than serious analysis.

The lesson here isn’t to fear the technology—it’s to understand the crime. The currency is irrelevant. What matters is recognizing the methods, adapting defenses, and staying vigilant in a world where innovation cuts both ways. Crypto, for all its flaws, isn’t the villain. It’s just the latest tool in a centuries-old game of cat and mouse.

PIG BUTCHERING  

Tactic 1: The Doppelgänger Deception: How Deepfakes and the Dark Web Are Redefining Fraud

The Deepfake Dilemma: A Double-Edged Sword

In the age of artificial intelligence, deepfakes are no longer the stuff of sci-fi—they’re the signature weapon in a new era of fraud. Seamlessly crafted videos, voice clones, and facial mimicry software have enabled criminals to impersonate individuals with chilling accuracy. Once relegated to Hollywood special effects, this technology is now a favorite tool of dark web fraudsters, who use it to bypass security systems and wreak havoc on unsuspecting victims and institutions alike.

Recent statistics are sobering. A global survey found that 47% of organizations have already encountered deepfake attacks, while 70% believe such incidents will have a high impact on their operations. The financial cost is staggering, with over $10 billion lost to scams in 2023 alone, and deepfakes emerging as a top concern alongside phishing and ransomware.

How It Works: The Anatomy of a Deepfake Scam

Identity Harvesting: Fraudsters build identity kits by acquiring facial images and matching government IDs. These can come from stolen databases—or alarmingly—willing sellers trading their identities for quick cash on the dark web.

Synthetic Persona Creation: Using advanced AI, attackers create highly convincing fake videos and voice models. These mimic real-time human expressions and responses, making them nearly indistinguishable from the genuine article.

System Exploitation: Armed with a deepfake, criminals bypass biometric systems, gain unauthorized access to accounts, or even commit large-scale social engineering scams. For instance, deepfakes have been used to deceive financial institutions, tricking them into approving fraudulent transactions.

Monetization: From impersonating executives in business email compromise (BEC) schemes to extorting individuals by misusing their synthetic likeness, the financial and reputational damage is vast.

The Dark Web's Face Factory

A recent investigation uncovered a "facial ID farm" on the dark web, where criminals assemble comprehensive identity kits—combining facial images, government IDs, and metadata—designed to defeat Know Your Customer (KYC) protocols. Shockingly, many of these identities come from individuals willingly selling their personal data for short-term financial gain, oblivious to the long-term consequences.

This industrialization of identity theft highlights a chilling evolution in fraud. Traditional security measures like liveness detection and biometric matching are no longer sufficient. Attackers have learned to exploit weaknesses, such as using AI-generated videos to mimic real-time interactions or employing 3D modeling to fool facial recognition systems.

Defense Strategies: Battling the Deepfake Crisis

Adopt Multi-Layered Security: Single defenses like liveness detection or facial recognition are no longer enough. Organizations need multi-factor authentication that combines biometrics with real-time challenge-response mechanisms and metadata analysis.

Invest in Threat Intelligence: Continuous monitoring of threat actor patterns and AI-driven detection systems can help identify and neutralize novel attack vectors.

Educate and Inform: Individuals must be cautious about sharing personal information or images online. Always verify requests for sensitive data and be wary of unsolicited communications.

Leverage AI for Defense: As AI fuels these attacks, it must also be the shield. Advanced machine learning systems can analyze multimodal signals, detect anomalies, and thwart even sophisticated attempts.

The Fraudfather’s Take:

Deepfakes are a case study in Robert Greene’s 48 Laws of Power:

Law 6: Court Attention at All Costs: Fraudsters use the spectacle of deepfakes to dominate their victims’ trust and resources.

Law 28: Enter Action with Boldness: The sheer audacity of creating and deploying deepfakes is central to their success.

Law 31: Control the Options: By dictating the terms of interaction—through impersonation or deception—criminals leave their targets with no good choices.

Meanwhile, Robert Cialdini’s Principle of Authority explains why these scams succeed: a deepfake’s ability to convincingly mimic authority figures—be it a CEO or a trusted friend—leads victims to compliance without question.

Deepfakes are more than just technological curiosities; they are harbingers of a seismic shift in how fraud operates. The fight against them will not be won by complacency but by proactive adaptation. In this digital battlefield, trust is the currency—and right now, it’s under siege.

As always, the question isn’t whether we’ll face these challenges—it’s whether we’ll rise to meet them.

AFFILIATE FRAUD

Tactic #2: The Honey Trap: How PayPal’s Coupon King Stings Influencers and Businesses Alike

Affiliate marketing—on paper, it’s a straightforward dance. Brands recruit influencers to push products; influencers generate sales through custom links; and everyone, ideally, walks away richer. It’s capitalism with a social media spin, a symbiotic relationship powered by trust, creativity, and hustle. Yet enter PayPal Honey, the browser extension turned digital parasite, and suddenly, this tidy ecosystem starts to unravel.

Allegations against Honey suggest it hijacks affiliate commissions, replacing the influencer’s painstakingly generated links with its own. This shadowy maneuver—disguised as a “money-saving tool”—doesn’t just cheat influencers out of income; it manipulates consumer trust and inflates costs for businesses. And the kicker? Honey still pockets the commission, even when the discounts it promises don’t exist.

What Is Affiliate Marketing (For the Uninitiated)?

Affiliate marketing is essentially digital matchmaking with a payday. Influencers embed unique links into their content, directing followers to buy from specific brands. When a purchase happens, the influencer earns a percentage of the sale—a tidy reward for their persuasive skills and hard-earned audience. It’s an honest grind, requiring relentless creativity and authentic connection. Honey’s alleged scheme spits in the face of this system, turning loyal followers into unwitting accomplices in theft.

How PayPal Honey Allegedly Operates

The grift is simple but devastatingly effective:

  1. You, the consumer, click an influencer’s affiliate link and fill your cart.

  2. At checkout, Honey swoops in with its cheery promise to “find savings.”

  3. Honey replaces the influencer’s affiliate cookie with its own, claiming the commission meant for the influencer.

  4. You leave feeling thrifty. The influencer leaves empty-handed. Honey laughs all the way to the bank.

This bait-and-switch trick isn’t just unethical—it’s parasitic. Influencers, who invest time, energy, and authenticity into driving sales, are being cut out at the final, most lucrative step.

The Real Cost of Honey’s Stunt

For Influencers: Losing affiliate income means losing the backbone of their business. Imagine building a bridge to prosperity only to have someone else charge a toll for crossing it.

For Businesses: Honey’s antics artificially inflate customer acquisition costs, skewing analytics and devaluing genuine marketing efforts. The result? Higher costs and lower trust.

For Consumers: Honey doesn’t always deliver the best deals, steering buyers toward “partner” merchants while withholding potentially better discounts elsewhere.

The Fraudfather’s Take:

Honey’s alleged practices expose a hard truth about modern commerce: convenience often masks exploitation. This isn’t just a story about coupon codes—it’s a warning about the digital middlemen who profit from your trust while draining the lifeblood of creators and businesses.

Critics love to dismiss affiliate marketing as frivolous, but its principles—fair compensation for effort, trust between creators and their audience—are foundational. Honey’s scheme undermines those principles. And while it may seem like a small-scale hustle, the cumulative effect—thousands of influencers cheated, millions in misallocated funds—is anything but minor.

Remember, it’s not the tool (Honey, crypto, cash) that defines the morality of commerce—it’s the intent behind its use. Honey’s alleged tactics demonstrate that even a browser extension can be weaponized against the very ecosystem it claims to support.

The lesson? Don’t let the promise of savings blind you to the cost of integrity. Whether you’re a consumer, a business, or an influencer, understanding the hidden mechanisms of the marketplace is your best defense.

Criminal Insights

“It is a capital mistake to theorize before one has data. Insensibly one begins to twist facts to suit theories, instead of theories to suit facts.”

Sir Arthur Conan Doyle

Sir Arthur Conan Doyle, born in Edinburgh in 1859, was a man of paradoxes. Best known for creating Sherlock Holmes, the hyper-logical detective who defined reason in fiction, Conan Doyle himself spent much of his later life fervently advocating for Spiritualism, a belief in communication with the dead. A trained physician turned literary titan, he rose to fame with A Study in Scarlet (1887), launching a character so beloved that public demand forced his resurrection after an infamous "death." Beyond Holmes, Conan Doyle's life was a whirlwind of patriotism, writing, and intellectual curiosity—serving as a war correspondent, penning histories of World War I, and earning a knighthood in 1902. Yet, personal tragedy during the Great War, including the death of his son Kingsley, pushed him toward Spiritualism, leading to public feuds, global lectures, and embarrassing endorsements like the Cottingley Fairy hoax. Until his death in 1930, Conan Doyle embodied a tension between reason and belief, leaving behind a legacy as complex and compelling as his most famous creation.

The Fraudfather's Note: Conan Doyle’s story reminds us of the power of belief and the tension between skepticism and faith. As Sherlock Holmes would advise, 'Eliminate the impossible, and whatever remains, however improbable, must be the truth.' Yet even Doyle could not resist the allure of the improbable."

“I learned early that class is universally admired. Almost any fault, sin or crime is considered more leniently if there’s a touch of class involved.”

Frank W. Abagnale

Frank Abagnale, the infamous con artist turned celebrated security consultant, is a living testament to the power of reinvention. Born in 1948 in New York, Abagnale's criminal exploits began in his teenage years, forging checks and assuming an array of false identities, including an airline pilot, a doctor, and a lawyer. By the age of 21, he had successfully scammed millions of dollars from banks and businesses across the globe, leaving law enforcement agencies bewildered and chasing his trail. Captured in France and eventually serving time in multiple countries, Abagnale’s story took a dramatic turn when the FBI enlisted his help to combat financial fraud. Today, as the founder of Abagnale and Associates, he advises corporations and government agencies on security issues. Immortalized in Steven Spielberg's Catch Me If You Can, Abagnale’s life is both a cautionary tale of youthful audacity and a redemption arc grounded in the pragmatic application of his criminal genius.

Amid the roar of engines and the chaos of battle, a WWII bomber returns home scarred but resilient, its fuselage marked with the silent testimony of survival. In the shadow of its damage, a lone statistician unravels the invisible logic of war, finding answers not in what is seen, but in what is missing.

Survivorship Bias Reloaded: Abraham Wald’s Invisible Lessons for a Digital World

Abraham Wald was an unlikely wartime hero. Born in 1902 in the waning days of the Austro-Hungarian Empire, he was the son of a kosher baker in what would become Cluj, Romania. A mathematical prodigy drawn to the most abstract realms of the field, Wald found himself an outsider in 1930s Vienna—a Jewish intellectual in a society closing its doors to him. Fleeing the tightening grip of Nazism, he sought refuge in the United States, where his brilliance was conscripted into the war effort at Columbia University's Statistical Research Group.

The military faced a dire problem: bombers were being torn apart over Europe. Engineers meticulously recorded the damage on returning aircraft, noting that bullet holes were concentrated in the fuselage, wings, and tail. The brass concluded that these areas needed more armor. Wald, however, saw the fatal flaw in their logic. They were only examining planes that made it back. Those hit in critical areas—like the engines and cockpits—never returned. By focusing on visible damage, they were armoring the wrong spots. His counterintuitive advice was revolutionary: protect the unmarked areas where hits were fatal. This insight saved countless lives and aircraft, defying conventional wisdom with piercing clarity.

Abraham Wald’s famous insight visualized: The red dots show where surviving planes sustained damage. The untouched areas? Silent evidence of where hits were fatal, revealing the unseen vulnerabilities that reshaped wartime strategy—and our understanding of survivorship bias.

In 1943, Abraham Wald forever altered the trajectory of war with a deceptively simple observation about what wasn’t there. The bullet holes absent on bomber engines weren’t proof of their invincibility but a silent obituary for the planes that didn’t return. Today, his lesson resonates far beyond the battlefield. Survivorship bias—the cognitive trap of focusing on successes while ignoring invisible failures—isn’t just an academic curiosity; it’s a pervasive blind spot in business, technology, and our decision-making.

For those new to this idea, survivorship bias explains why we lionize success without studying failure. Why we imitate top-performing startups while ignoring the quiet graves of failed ventures. Why we armor what’s visible while leaving what’s vital exposed. Wald’s brilliance wasn’t just in identifying the problem—it was in challenging the seductive allure of surface-level logic.

But Wald’s framework isn’t unique. To reinvigorate this lesson, let’s turn to a few other works that amplify and expand its wisdom:

Nassim Nicholas Taleb’s Fooled by Randomness reminds us that success often owes more to luck than skill. Just as Wald understood that visible data can mislead, Taleb teaches us to dissect outcomes with humility, looking for hidden variables and acknowledging the role of chance.

Annie Duke’s Thinking in Bets brings the idea into decision-making. Duke urges us to think probabilistically, considering unseen information and “unknown unknowns” rather than relying solely on what’s obvious or present.

Daniel Kahneman’s Thinking, Fast and Slow exposes the cognitive biases that lead us to fall for survivorship bias in the first place. Kahneman’s dual-system thinking underscores the need for deliberate, analytical reflection to overcome instinctual oversights.

So what does this mean for us today—especially for a world navigating fraud, technology, and cybercrime?

Lessons Reinforced for a Hyperconnected Era

Understand the Cost of Visibility: In fraud detection, we obsess over patterns that surface: breached accounts, flagged phishing attempts, overt scams. But what about the undetected fraud? The insider threats never reported, the scams that succeed in silence? The unseen enemy shapes the battlefield as much as the visible one.

Diversify Input Sources: Just as Wald saw what his peers could not, success often requires breaking out of echo chambers. Seek dissenting voices, integrate multidisciplinary perspectives, and interrogate the data you’re not collecting.

Quantify the Invisible: Use simulations, hypothetical modeling, and counterfactual thinking to estimate what’s missing. If your data shows zero fraud in a specific segment, consider whether that’s due to strong controls—or because you’re not looking deeply enough.

Adopt Anti-Fragility: Borrowing from Taleb, anti-fragile systems don’t just withstand chaos; they thrive on it. Design fraud-prevention systems that grow smarter and more adaptive with every attack, capable of learning from unseen gaps as well as direct hits.

Recognize the Role of Luck: In fraud prevention or cybersecurity, a clean record doesn’t always equate to excellence. It could signify the absence of significant tests. Test your defenses proactively—because no news isn’t always good news. In other words, absence of evidence is not evidence of absence.

The Fraudfather’s Final Take: The Invisible Shields

Survivorship bias doesn’t merely distort our view of history—it obscures the vulnerabilities that shape our present and future. The planes that didn’t return, the startups that never scaled, the fraud that quietly siphons resources—all hold lessons far more critical than those of evident success.

If Abraham Wald taught us one thing, it’s that what you don’t see can kill you. The same is true in fraud prevention, cybersecurity, and every realm that demands vigilance. Look beyond the victories. Study the wreckage. Don’t just armor what’s already been hit—fortify what can’t afford to fail.

True wisdom isn’t about knowing where to look—it’s about knowing where you’ve failed to see.

About The Fraudfather

The Fraudfather combines a unique blend of experiences as a former Senior Special Agent, Supervisory Intelligence Operations Officer, and now a recovering Digital Identity & Cybersecurity Executive, He has dedicated his professional career to understanding and countering financial and digital threats.

Fast Facts Regarding the Fraudfather:

  • Global Adventures: He’s been kidnapped in two different countries—but not kept for more than a day.

  • Uncommon Encounter: Former President Bill Clinton made him a protein shake.

  • Unusual Transactions: He inadvertently bought and sold a surface-to-air missile system.

  • Perpetual Patience: He spent 12 hours in an elevator.

  • Unique Conversations: He spoke one-on-one with Pope Francis for five minutes using reasonable Spanish.

  • Uncommon Hobbies: He discussed beekeeping with James Hetfield from Metallica.

  • Passion for Teaching: He taught teenagers archery in the town center of Kyiv, Ukraine.

  • Unlikely Math: Until the age of 26, he had taken off in a plane more times than he had landed.

This newsletter is for informational purposes only and promotes ethical and legal practices.