The Briefing Room
The Briefing Room is the back room of all things Emulated Criminals. It contains stories of crimes committed and evidence gathered by the EC team. If you subscribe today, you'll get full access to the website as well as email newsletters about new content when it's published. You'll also have access to the full archive of everything that's been published before. Have questions or comments? Hit us at contact@emulatedcriminals.com
The Emulated Criminals Team
EC is operated by veterans of U.S. Special Operations and Offensive Cyber Operations, industry professionals, and experts who are just one step away from being real criminals. The only thing stopping them is strong morals, a fear of prison, and the fun involved in beating the baddies.
Dahvid Schloss, Emulated Mob Boss (CEO)
Dahvid is our Emulated Mob Boss. He began his career journey as a Special Operations RTO/Communication operator before pivoting into Offensive Cyber Operations in the military. From there, he tormented a prominent Big 4 consulting firm with his red teaming prowess before moving into director-level offensive security roles at smaller organizations.
Over the course of his 15+ years in the industry, he's refined his craft in cyber-attack and exploitation, including logical, social, and physical infiltration, while expanding his knowledge in defensive realms like incident response and hardening of systems and networks. When he's not plotting emulated security mayhem with his teams, he moonlights as a Malware Development Instructor, demystifying the realm of programming for the next generation of cyber operatives.
Ann Rinaldi, Emulated Capo (CRO)
As Emulated Capo, ahem... CRO, Ann is responsible for strong-arming organizational leadership into becoming clients, ahem... growing and maintaining our relationships, including those brave enough to allow our criminals to break into their systems and wreak havoc, ahem... find problems that need solving.
Her decade of experience in technology marketing, sales, and training, including 4 years at a cybersecurity startup, has prepared her to turn potential victims into victors. May the odds be ever in your favor!
Bill Van Emburg, Emulated Heavy (CRO)
Every org needs a heavy! Watch out; he’s bound to make you an offer you can’t, or at least shouldn’t, refuse! Bill Van Emburg began his career as a technologist, working for many years in application development, operations, security, and infrastructure. Eventually, he founded his own technology consulting firm.
As a serial entrepreneur, Bill has built and sold several technology businesses. During that time, he learned and honed the art of great marketing, specifically within the technology space. In addition to his work at EC, Bill also owns and operates Van Emburg Marketing.
Our Technical Experts (other than Dahvid) choose to remain anonymous... hire us and you get to meet them!
Emulated Soldato
Retail PC Sales Goofball, Software Tester, IT Systems Domain Administrator, Security Engineer, Warehouse Inventory Monkey, [REDACTED] (Not really, but it's funnier than the real title), Senior Security Engineer, Team Lead, and now... Emulated Criminal.
While not a particularly obscure or uncommon career progression, our resident hillbilly hacker, has spent 15+ years in the cybersecurity industry including several years in US Special Operations. In addition to enterprise infrastructure, if it talks to other things, he has probably hit it with the proverbial hammer at some point; cars, airplanes, SCADA Networks, even the occasional IOT toaster, you name it, he can poke a hole in it. His professional focus has always been on ensuring that organizations are presented with the most realistic scenarios that simulate the TTPs of actual Threat Actors as closely as possible. Is he going to ask to do some borderline deranged operations to meet that goal? Yeah, probably. But it usually works.
Time to take the cuffs off. Baddies don't believe in scope.
Emulated Fisherman
Specializing in payload delivery and social engineering infrastructure, with a strong focus on developing and refining techniques for evading external-facing security controls, over the past eight years, he has programmed in more than a dozen languages—ranging from low-level to high-level and declarative—giving him a versatile foundation for both offensive security and software development.
While he’s capable in malware development, his strengths truly shine on the delivery side, with his research centering around bypassing filters and security mechanisms during phishing engagements—whether for email delivery or payload execution.
Why would he do this? Because he’s genuinely fascinated by the mechanics of payload delivery—why certain methods succeed against the odds, and what makes a message or link irresistible to a target—and because very few people were exploring this niche seriously. Once he discovered this glaring knowledge gap, it became his personal mission, and he has spent years building multiple frameworks for delivery and studying browser defenses to refine his tactics. It’s a space where his passion for programming and offensive security intersect in the most compelling way.
Give him your permission to test the limits of your organization’s scam-detection capabilities, and he’ll show you how quick the carrot turns into the stick.
Emulated Malcontent
Our Emulated Malcontent supports the engineering and infrastructure needs at Emulated Criminals. For years, he's been interested in offensive security and malware. He entered the security industry on a research team, picking apart binary samples and network traffic to write custom detection logic. He has roots in operations and development, though, with a background in cloud consulting at a FAANG company and having built several large server clusters from the ground up for compute hosting and networking services on the side. This affords him a great platform on which to experiment with the development of custom C2 servers, exploit honeypots, and the general tooling needed to support the Emulated Criminals team.
Emulated Bandit
Starting with an internship doing defensive security work for a local police department, our Emulated Bandit learned first-hand the intricacies of how a threat actor breaches a network. Recruited by the Emulated Mob Boss himself, this dude began hacking companies to help them secure their environments before the real criminals snuck through their defenses. With primary focuses on social engineering, physical security, and active directory exploitation, the Emulated Bandit is well equipped to take on the cyber landscape's everyday challenges. When he's not performing said ethically malicious actions, he presents to college and high school students about how to break into cybersecurity/offensive security and join the mob.