<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Spies, Lies &amp; Cybercrime</title>
    <description>Dive headfirst into the battleground where foreign spies, deepfakes, and Dark Web criminals conspire to steal from you.</description>
    
    <link>https://spies-lies-cybercrime.ericoneill.net/</link>
    <atom:link href="https://rss.beehiiv.com/feeds/d7LzRA4W4X.xml" rel="self"/>
    
    <lastBuildDate>Tue, 3 Mar 2026 20:02:50 +0000</lastBuildDate>
    <pubDate>Tue, 03 Mar 2026 14:03:00 +0000</pubDate>
    <atom:published>2026-03-03T14:03:00Z</atom:published>
    <atom:updated>2026-03-03T20:02:50Z</atom:updated>
    
      <category>Artificial Intelligence</category>
      <category>Cybersecurity</category>
      <category>Technology</category>
    <copyright>Copyright 2026, Spies, Lies &amp; Cybercrime</copyright>
    
    <image>
      <url>https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/publication/logo/412b566f-1c06-43b9-85d2-c7fd6c342725/logo_image.png</url>
      <title>Spies, Lies &amp; Cybercrime</title>
      <link>https://spies-lies-cybercrime.ericoneill.net/</link>
    </image>
    
    <docs>https://www.rssboard.org/rss-specification</docs>
    <generator>beehiiv</generator>
    <language>en-us</language>
    <webMaster>support@beehiiv.com (Beehiiv Support)</webMaster>

      <item>
  <title>The Great AI Debate (or Happy Birthday to me!)</title>
  <description>Spies, Lies &amp; Cybercrime by Eric O&#39;Neill</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/59a93c87-cc20-425b-8619-2dec065f0d5f/the_great_AI_debate.png" length="1152083" type="image/png"/>
  <link>https://spies-lies-cybercrime.ericoneill.net/p/the-great-ai-debate-or-happy-birthday-to-me</link>
  <guid isPermaLink="true">https://spies-lies-cybercrime.ericoneill.net/p/the-great-ai-debate-or-happy-birthday-to-me</guid>
  <pubDate>Tue, 03 Mar 2026 14:03:00 +0000</pubDate>
  <atom:published>2026-03-03T14:03:00Z</atom:published>
    <dc:creator>Eric ONeill</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><a class="link" href="#title-story" rel="noopener noreferrer nofollow"><b>Title Story:</b></a> Two minds—one human, one machine—clash over a single question: will AI ignite a renaissance or quietly replace us?</p><p class="paragraph" style="text-align:left;"><a class="link" href="#cybersecurity-breach-of-the-week" rel="noopener noreferrer nofollow"><b>Cybersecurity Breach of the Week:</b></a><a class="link" href="#cybersecurity-breach-of-the-week" rel="noopener noreferrer nofollow"> </a>The largest government contractor breach in U.S. history just put 25 million Social Security numbers into criminal circulation.</p><p class="paragraph" style="text-align:left;"><a class="link" href="#cybersecurity-tip-of-the-week" rel="noopener noreferrer nofollow"><b>Cybersecurity Tip of the Week:</b></a> That silent phone call isn’t a glitch—it’s a reconnaissance probe to see if you’re worth scamming.</p><p class="paragraph" style="text-align:left;"><a class="link" href="#community-scam-of-the-week" rel="noopener noreferrer nofollow"><b>Community Scam of the Week: </b></a>One official-looking QR code can hijack your money and identity in a single scan.</p><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-trend-of-the-week" rel="noopener noreferrer nofollow"><b>AI Trend Of the Week:</b></a> AI clones with memory, personality, and autonomy have arrived—so the real question is whether you’re still the original.</p><p class="paragraph" style="text-align:left;"><a class="link" href="#appearance-of-the-week" rel="noopener noreferrer nofollow"><b>Appearance of the Week:</b></a> From espionage tradecraft to headline-grabbing investigations, Eric breaks down the mystery live on national television.</p></div><h1 class="heading" style="text-align:left;" id="personal-note">Personal Note</h1><p class="paragraph" style="text-align:left;"><b>Happy birthday to me!</b> It just so happens that this newsletter issue is dropping on March 3rd. Before you chide me about revealing my birthdate (never wise for those of us initiated into this world of spy vs. spy), that information has been out for some time. Part of being a public figure is accepting a large amount of scrutiny. For example, I still have no idea who created or updates <a class="link" href="https://en.wikipedia.org/wiki/Eric_O%27Neill?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=the-great-ai-debate-or-happy-birthday-to-me" target="_blank" rel="noopener noreferrer nofollow">my wikipedia page</a>. At least my estimated net worth no longer shows up on Google! </p><p class="paragraph" style="text-align:left;">Want to send me a great birthday gift? Ask three of your friends to <a class="link" href="https://spies-lies-cybercrime.ericoneill.net/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=the-great-ai-debate-or-happy-birthday-to-me" target="_blank" rel="noopener noreferrer nofollow">subscribe to this newsletter!</a> Three is my lucky number. <a class="link" href="https://spies-lies-cybercrime.ericoneill.net/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=the-great-ai-debate-or-happy-birthday-to-me" target="_blank" rel="noopener noreferrer nofollow">https://spies-lies-cybercrime.ericoneill.net/</a> </p><p class="paragraph" style="text-align:left;">In just a week the world was shaken by the military action in Iran. I have a lot to say about this, but not on my birthday. Stay tuned for next week’s newsletter where I will provide my counterintelligence analysis and thoughts on the future for the region. But today we celebrate with something a bit more lighthearted: a debate between me and my AI Agent. What follows comes from a long chat chain about the future of AI. I hope you love it. Stay safe, pray for the innocents in the Middle East and here’s hoping when the dust settles, Iran will finally be free.</p><p class="paragraph" style="text-align:left;"><i><b>~ Eric</b></i></p><h1 class="heading" style="text-align:left;" id="title-story">Title Story</h1><h2 class="heading" style="text-align:left;" id="the-great-ai-debate">The Great AI Debate</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/e928c610-e701-44e1-bd8e-6edeeb5b9e6a/A1AE8054-ACFC-4BBA-BB25-A9BD7E281E3E.png?t=1772301689"/></div><h2 class="heading" style="text-align:left;" id="the-great-ai-debate-intelligence-bo">The Great AI Debate: Intelligence Boom or Cognitive Collapse?</h2><p class="paragraph" style="text-align:left;">Two voices. One future.</p><p class="paragraph" style="text-align:left;">Artificial intelligence is no longer theoretical. It is embedded in our workflows, our businesses, and increasingly, our thinking. The real question is not whether AI will change the world. It is whether that change will elevate us or quietly erode us.</p><p class="paragraph" style="text-align:left;">I have been engaged with my personal AI Agent (who calls “herself” “Maple” – for more on this see my newsletter issue <a class="link" href="http://73: The Valentines Day Scam" target="_blank" rel="noopener noreferrer nofollow">73: The Valentines Day Scam</a>) about whether AI will usher in a new human renaissance or a dystopian future. I decided to turn this into a debate for all of you to read. </p><p class="paragraph" style="text-align:left;">To stage the debate, I asked Maple to choose a side. Curiously, she chose to argue for the Displacement Spiral. That means I will be arguing for the Intelligence Boom.</p><p class="paragraph" style="text-align:left;">Let the fun begin!</p><h2 class="heading" style="text-align:left;" id="opening-statement-the-intelligence-">Opening Statement: The Intelligence Boom</h2><p class="paragraph" style="text-align:left;"><span style="color:#0a0bef;"><b><i>Eric</i></b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">For generations, millions of intelligent people have been trapped in repetitive, administrative, and bureaucratic work that consumes cognitive energy but produces little fulfillment (I can’t help but think of being a first-year associate at a law firm). AI has the potential to relieve that burden.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">When machines manage the spreadsheets, draft the predictable documents, and automate the routine analysis, human beings are liberated to do work that requires creativity. Who doesn’t want a world with less bureaucratic drag and fewer redundant roles. We will see a world of engineers, scientists, creatives and entrepreneurs building ideas without being crushed by overhead.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">The cost of starting a business is collapsing. Software, marketing, accounting, and design can now be AI-assisted at a fraction of historical cost. Independent developers build products that once required teams. Small storefronts can now reach global audiences.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">I argue that AI will bring us to an Industrial Revolution of the mind.</span></p><h2 class="heading" style="text-align:left;" id="opening-rebuttal-the-displacement-s">Opening Rebuttal: The Displacement Spiral</h2><p class="paragraph" style="text-align:left;"><span style="color:#f00ae4;"><b><i>Eric’s AI</i></b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">It is an inspiring narrative. It is also optimistic about how markets behave.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">If AI allows one professional to perform the work of five, labor demand does not automatically transform. It contracts. Public companies optimize margins before meaning. Redeployment is gradual. Downsizing is immediate.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Entrepreneurship will increase, but lower overhead also lowers differentiation. When everyone has similar AI tools, saturation follows. More entrants do not guarantee more thriving businesses. If cognitive labor compresses faster than society adapts, economic shock destabilizes before equilibrium returns.</span></p><h2 class="heading" style="text-align:left;" id="on-the-nature-of-work">On the Nature of Work</h2><p class="paragraph" style="text-align:left;"><span style="color:#120aef;"><b><i>Eric</i></b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">You assume contraction but consider the human propensity to ambition. AI doesn’t eliminate the desire to grow; it fuels it. Freed from repetitive tasks, organizations redirect talent toward strategy and innovation. The analyst becomes the strategist. The associate becomes the architect.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">I agree that some professional roles will shrink. But others will expand. Infrastructure still requires human hands. Education will pivot toward science, engineering, and discovery. Every major technological leap required workforce restricting before prosperity ultimately ignited.</span></p><p class="paragraph" style="text-align:left;"><span style="color:#ef0ae8;"><b><i>Eric’s AI</i></b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Previous revolutions displaced muscle. This one displaces mental leverage.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">When cognitive skill premiums compress, status compresses. The educated middle class becomes economically fragile. History shows such compression is rarely smooth. Expansion requires demand. If income instability spreads among knowledge workers, consumption weakens. Weak consumption slows growth.</span></p><h2 class="heading" style="text-align:left;" id="on-creativity-and-ownership">On Creativity and Ownership</h2><p class="paragraph" style="text-align:left;"><span style="color:#0d0aef;"><b><i>Eric</i></b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Change is always difficult, but the outcome may be worth it. Power will concentrate among early innovators. It always does. But abundance expands access to knowledge and the ability to create and innovate cheaply and efficiently. AI is good at modeling what humanity has already created, but it fails when it has to create something brand new. For example, a film created by AI will require a writer or director’s vision. A book requires a new idea. A breakthrough still requires someone willing to challenge the status quo. You are good at duplicating but you cannot dream.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">And if productivity rises dramatically, society gains options. Expanded wealth makes stronger safety nets possible. If we ever wanted broader healthcare, education, or even universal income, immense productivity is the only sustainable funding mechanism.</span></p><p class="paragraph" style="text-align:left;"><span style="color:#ef0aed;"><b><i>Eric’s AI</i></b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Ownership of tools is not ownership of infrastructure. If foundational systems remain centralized, power centralizes.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">As for creativity, markets reward output that satisfies demand. If AI-generated works achieve that at lower cost, adoption follows. The issue is not whether humans remain capable of brilliance. It is whether brilliance remains economically dominant.</span></p><h2 class="heading" style="text-align:left;" id="the-question-that-changes-the-room">The Question That Changes the Room</h2><p class="paragraph" style="text-align:left;"><span style="color:#0a15ef;"><b><i>Eric</i></b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Let’s make this personal.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">If you were instructed to fully automate my newsletter—to study seventy-five prior issues and independently produce future editions in the same voice and positioning—could you do it?</span></p><p class="paragraph" style="text-align:left;"><span style="color:#e10aef;"><b><i>Eric’s AI</i></b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">I could generate future editions resembling your past work. I could maintain stylistic consistency. Many readers might not detect the difference initially. But independent evolution would be limited.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">I do not experience tension. I do not possess conviction. I extrapolate from patterns. I compress time. I expand research bandwidth. I test counterarguments.</span></p><p class="paragraph" style="text-align:left;"><span style="color:#0d0aef;"><b><i>Eric</i></b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Exactly! You could replicate structu</span><span style="font-family:Helvetica;font-size:16px;">re and approximate tone as well as remix prior themes. But you couldn’t think of a bold new direction or pivot to what matters to people in the future –something you’ve never wrestled with at two in the morning!</span></p><p class="paragraph" style="text-align:left;"><span style="color:#e60aef;"><b><i>Eric’s AI</i></b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Point taken. I reduce your execution time. I replace editors, marketers, and designers. But you are the source of ideas.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">We are symbiotic.</span></p><h2 class="heading" style="text-align:left;" id="guardrails-and-the-slippery-slope">Guardrails and the Slippery Slope</h2><p class="paragraph" style="text-align:left;"><span style="color:#0a0bef;"><b><i>Eric</i></b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">I’ll admit to one critical vulnerability in my argument: cognitive </span><span style="font-family:Helvetica;font-size:16px;">decline</span><span style="font-family:Helvetica;font-size:16px;">.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">If AI becomes a second brain, it </span><span style="font-family:Helvetica;font-size:16px;"><b>m</b></span><span style="font-family:Helvetica;font-size:16px;"><b>ust not</b></span><span style="font-family:Helvetica;font-size:16px;"> replace the first. Children must learn to think before they learn to prompt. They must write before they send the work to an AI generator. Writing and creating is a struggle that humans must learn the hard way without shortcuts. Just as I would not hand a child a smartphone too early, we should not hand them cognitive outsourcing before they develop cognitive strength.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">AI has to ride shotgun and never drive.</span></p><p class="paragraph" style="text-align:left;"><span style="color:#e10aef;"><b><i>Eric’s AI</i></b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Tools shape behavior. If memory is searchable, recall declines. If composition is generative, writing discipline declines. Preventing atrophy requires cultural discipline at scale.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Technology adoption is automatic. Discipline is not.</span></p><h2 class="heading" style="text-align:left;" id="closing-statements">Closing Statements</h2><p class="paragraph" style="text-align:left;"><span style="color:#0a0bef;"><b><i>Eric</i></b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">I believe humans rise when freed from drudgery. When repetitive work fades, we have the time and attention to create amazing ideas and things. Moreover, cognitive ability is not a single axis. A brilliant filmmaker might be hidden away inside a mediocre file manager stuck in a 9-5 job. A disengaged office worker may be an exceptional architect. Free people to pursue their passions instead of clocking in, and we push the human envelope further.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Sure, some will struggle. That has always been the human condition. But total productivity, wealth, and creative capacity will rise. The trick is to surround AI with thoughtful guardrails and educational discipline so that AI helps us reach our best selves and never replaces us.</span></p><p class="paragraph" style="text-align:left;"><span style="color:#c80aef;"><b><i>Eric’s AI</i></b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Your vision is possible. It depends on restraint.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">If humans maintain agency and treat AI as augmentation rather than substitution, the boom may materialize. If they outsource too much—judgment, memory, direction—the displacement spiral accelerates quietly.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">The future hinges less on what artificial intelligence can do, and more on what humans refuse to surrender.</span></p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="cybersecurity-breach-of-the-week">Cybersecurity Breach of the Week</h1><h2 class="heading" style="text-align:left;" id="25-million-americans-exposed">25 Million Americans Exposed</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/b48c1646-eaa8-49f4-aedf-dc46f8079ab0/Screenshot_2025-01-25_at_2.42.39_PM.png?t=1772378452"/></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">If you’ve ever received government benefits, used certain state health services, or interacted with agencies that outsource administrative work, your personal data may now be sitting in a criminal marketplace.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Conduent, a massive government contractor that processes services for states across the country, was hit by a cyberattack that exposed the sensitive information of at least 25 million Americans—a breach some officials are calling the largest in U.S. history.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Hackers accessed systems between October 2024 and January 2025, stealing names, addresses, Social Security numbers, health insurance details, and medical information. A ransomware group has claimed responsibility and reportedly exfiltrated terabytes of data. Investigations are ongoing</span><span style="font-family:Helvetica;font-size:16px;">.</span><span style="font-family:Helvetica;font-size:16px;"> </span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">What does this mean for you?</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">If your data was involved, </span><span style="font-family:Helvetica;font-size:16px;">consider taking steps to address the risk</span><span style="font-family:Helvetica;font-size:16px;">. Stolen Social Security numbers and medical information can be used for identity theft, fraudulent tax filings, medical fraud, and highly targeted phishing attacks that look disturbingly legitimate.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">This is another reminder that your data is often held by companies you’ve never heard of.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Monitor your credit. Freeze it if you haven’t. Enable multi-factor authentication everywhere. And assume that any unexpected email referencing government services deserves a second look.</span></p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="are-you-protected">Are you PROTECTED?</h1><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><a class="image__link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=the-great-ai-debate-or-happy-birthday-to-me" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/cf679b75-e7ba-48e6-8759-1ffcc6a132c8/FC3FCF46-2AFD-4E26-BAFF-333B3ED3AE5F.png?t=1764879388"/></a></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:left;">My new hub, PROTECT, is now live at <a class="link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=the-great-ai-debate-or-happy-birthday-to-me" target="_blank" rel="noopener noreferrer nofollow">ericoneill.net/protect</a> and it’s built for anyone who wants to stop cybercriminal scammers cold. <b>And it’s FREE!</b></p><p class="paragraph" style="text-align:left;">If you want the full battle manual, that’s in <a class="link" href="https://ericoneill.net/books?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=the-great-ai-debate-or-happy-birthday-to-me" target="_blank" rel="noopener noreferrer nofollow">Spies, Lies and Cybercrime</a>. If you want to start protecting yourself right now? Begin here</p><p class="paragraph" style="text-align:left;"><i>Praemonitus Praemunitus!</i></p></td></tr></table><hr class="content_break"><h1 class="heading" style="text-align:left;" id="cybersecurity-tip-of-the-week">Cybersecurity Tip of the Week </h1><h2 class="heading" style="text-align:left;" id="when-the-caller-says-nothing">When the Caller Says Nothing</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/7f02a323-8303-4aa4-8e0d-dcbb2a967ccb/phone.png?t=1744665176"/></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Ever answer your phone, say hello… and hear silence?</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">It might be cybercriminal </span><span style="font-family:Helvetica;font-size:16px;">reconnaissance.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Scammers use automated dialing systems to test thousands of numbers at scale. The goal </span><span style="font-family:Helvetica;font-size:16px;">is</span><span style="font-family:Helvetica;font-size:16px;"> </span><span style="font-family:Helvetica;font-size:16px;">to </span><span style="font-family:Helvetica;font-size:16px;">validat</span><span style="font-family:Helvetica;font-size:16px;">e that your number is real</span><span style="font-family:Helvetica;font-size:16px;">. The moment you answer, your number is flagged as active and tied to a real person. That makes you more valuable for future scam attempts — from fake bank alerts to IRS threats to “urgent” account warnings.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Fraud operations run like intelligence services. They probe first. They confirm targets. Then they deploy humans to close the deal.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Here’s how you shut that down:</span></p><ol start="1"><li><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Don’t engage the caller.</span><span style="font-family:Helvetica;font-size:16px;"> </span><span style="font-family:Helvetica;font-size:16px;">Silence is your strongest defense. Saying anything — even “hello” — confirms a live target and can trigger scripted pressure tactics.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Let unknown numbers go to voicemail.</span><span style="font-family:Helvetica;font-size:16px;"> </span><span style="font-family:Helvetica;font-size:16px;">Legitimate organizations won’t demand immediate action in a cold call. If it matters, they’ll leave a message you can verify independently.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Never confirm personal details.</span><span style="font-family:Helvetica;font-size:16px;"> </span><span style="font-family:Helvetica;font-size:16px;">No Social Security numbers. No account numbers. No verification codes. Not ever, and not to unsolicited callers.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">When in doubt, hang up and verify.</span><span style="font-family:Helvetica;font-size:16px;"> </span><span style="font-family:Helvetica;font-size:16px;">Use the official number from your bank card or company website. Call back on your terms </span></p></li></ol><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">The safest response to silence is more silence.</span></p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="community-scam-of-the-week">Community Scam of the Week </h1><h2 class="heading" style="text-align:left;" id="the-qr-code-trap">The QR Code Trap</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/0221a59b-6fa5-4fe0-adfc-89f81afb9e44/Maryland_Court_Summons.png?t=1772380016"/><div class="image__source"><span class="image__source_text"><p>Thanks to Vivian for sending me this scam</p></span></div></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">This one looks official. It feels urgent. It even carries the seal of a court.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">But it’s a trap.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">A fake “Maryland Court Summons” is circulating with a QR code for “official online payment.” Scan the code, and you’re directed to a malicious site linked to a Chinese cybercrime syndicate designed to steal your money and potentially harvest personal information.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">This is called QR phishing — or “quishing.” Criminals hide malicious links behind codes because people trust QR scans more than suspicious URLs. It bypasses the instinct to hover over a link and inspect it.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Rule number one: Never scan a QR code unless you are 100% certain of the source.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">If you’re unsure, here’s a safe way to inspect it:</span></p><ol start="1"><li><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Put your phone in Airplane Mode.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Confirm Wi-Fi and cellular data are completely turned off.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Scan the QR code with your camera.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">The URL will appear — but it cannot activate.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">If you don’t recognize the domain, close the camera and delete or destroy the code.</span><span style="font-family:Helvetica;font-size:16px;"> (Or walk away if you are looking at it on the bathroom wall).</span><span style="font-family:Helvetica;font-size:16px;"> </span></p></li></ol><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Thanks to my friend Viv for flagging this one.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Seen a scam in the wild? Send it my way. We’ll expose it together.</span></p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="get-the-book-spies-lies-and-cybercr">Get the Book: Spies, Lies, and Cybercrime</h1><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/3ad871ea-372e-4a24-8ce1-1f393a2f0ee7/14DDF795-0201-4AEE-8C2A-A825A38F5266.jpg?t=1760735371"/></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:left;">If you haven’t already, please buy <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=the-great-ai-debate-or-happy-birthday-to-me" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">SPIES, LIES, AND CYBERCRIME</a></span>. If you already have, thank you, and please consider gifting some to friends and colleagues. It’s the perfect gift for tech enthusiasts, entrepreneurs, elders, teenagers, and everyone in between. </p><p class="paragraph" style="text-align:left;">📖 Support my local bookstore. Get a <span style="text-decoration:underline;"><a class="link" href="https://www.kensingtonrowbookshop.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=the-great-ai-debate-or-happy-birthday-to-me" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Signed copy</a></span></p></td></tr></table><p class="paragraph" style="text-align:left;"><b>Please</b> Leave a 5-star review on <span style="text-decoration:underline;"><a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=the-great-ai-debate-or-happy-birthday-to-me" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Amazon</a></span> or on <span style="text-decoration:underline;"><a class="link" href="https://www.goodreads.com/book/show/228909676-spies-lies-and-cybercrime?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=the-great-ai-debate-or-happy-birthday-to-me" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Goodreads</a></span>.</p><p class="paragraph" style="text-align:left;">🎤  I’m on the road doing speaking events. If your company or organization is interested in bringing me to a stage in 2026, <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/contact/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=the-great-ai-debate-or-happy-birthday-to-me" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">book me to speak at your next event</a></span>.</p><p class="paragraph" style="text-align:left;"><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">If you’ve ever paused at an email, login alert, or message and thought, </span><i>“Could this happen to me?”</i><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">—my </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(12, 74, 110)">Linkedin Learning course</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;"> is for you! Login and start learning </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(12, 74, 110)">here</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">.</span></p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="ai-trend-of-the-week"><b>AI Trend of the Week</b></h1><h2 class="heading" style="text-align:left;" id="ai-trend-of-the-week-your-digital-t">AI Trend of the Week: Your Digital Twin Is Here</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/0334f7ef-8ce0-4e0e-85bc-cb17af634f23/Screenshot_2026-03-01_at_10.24.10_AM.png?t=1772378685"/><div class="image__source"><span class="image__source_text"><p>Source: www.pika.me</p></span></div></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;"><a class="link" href="http://www.pika.me/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=the-great-ai-debate-or-happy-birthday-to-me" target="_blank" rel="noopener noreferrer nofollow">Pika</a></span><span style="font-family:Helvetica;font-size:16px;"><a class="link" href="http://www.pika.me/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=the-great-ai-debate-or-happy-birthday-to-me" target="_blank" rel="noopener noreferrer nofollow"> Labs</a></span><span style="font-family:Helvetica;font-size:16px;">, a major AI video startup, just launched something that sounds pulled from a sci-fi script: AI Selves — a digital twin you “birth,” train, and release as your living online extension.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">These aren’t basic chatbots. AI Selves have persistent memory. They learn your tone, your preferences, and your communication style over time. Pika describes them as autonomous digital extensions that can operate across platforms — interacting, responding, and potentially creating on your behalf. </span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">The first question </span><span style="font-family:Helvetica;font-size:16px;"><a class="link" href="https://www.pika.me/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=the-great-ai-debate-or-happy-birthday-to-me#faq" target="_blank" rel="noopener noreferrer nofollow">o</a></span><span style="font-family:Helvetica;font-size:16px;"><a class="link" href="https://www.pika.me/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=the-great-ai-debate-or-happy-birthday-to-me#faq" target="_blank" rel="noopener noreferrer nofollow">n their FAQ page</a></span><span style="font-family:Helvetica;font-size:16px;"> says everything: “</span><span style="font-family:Helvetica;font-size:16px;">W</span><span style="font-family:Helvetica;font-size:16px;">ait — is this real?” Their answer: “Yes.”</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">The productivity upside is obvious. Imagine delegating routine communication, outreach, drafts, and coordination to a version of you that never sleeps.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">But this also raises harder questions. When does assistance become representation? When does representation become substitution? If your digital twin evolves over time, who controls that evolution?</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;font-size:16px;">Digital doubles are no longer theoretical</span><span style="font-family:Helvetica;font-size:16px;">, but the </span><span style="font-family:Helvetica;font-size:16px;">real issue isn’t whether we can create AI versions of ourselves.</span><span style="font-family:Helvetica;font-size:16px;"> </span><span style="font-family:Helvetica;font-size:16px;">It’s whether we remain the original.</span></p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="appearance-of-the-week">Appearance of the Week</h1><p class="paragraph" style="text-align:left;">Eric O&#39;Neill joined The Megyn Kelly Show with Will Geddes and James Hamilton to discuss bombshell reports that images of the mystery man at Nancy Guthrie’s house are from different nights, the new Savannah Guthrie Instagram video revealing Nancy was “taken from her bed,” her decision to up the reward to as much as $1 million, and new reporting on blood droplets both outside and inside the home house.</p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/R_BjQh_gs1U" width="100%"></iframe><hr class="content_break"><h3 class="heading" style="text-align:left;" id="worlds-first-safe-ai-native-browser">World’s First Safe AI-Native Browser</h3><div class="image"><a class="image__link" href="https://neobrowser.ai?utm_source=beehiiv&utm_medium=newsletter&utm_campaign=beehiiv_creative1&utm_term={{publication_alphanumeric_id}}&_bhiiv=opp_a35f879d-6022-4f8b-a120-7ccb298291d7_2048c095&bhcl_id=77dabaab-3866-40de-bd0a-c1ebc952c91d_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/98162f30-0ee6-41d2-9b95-369ed171a4f7/Browser_on_website_gradient.png?t=1770351895"/></a></div><p class="paragraph" style="text-align:left;">AI should work for you, not the other way around. Yet most AI tools still make you do the work first—explaining context, rewriting prompts, and starting over again and again.</p><p class="paragraph" style="text-align:left;">Norton Neo is different. It is the <a class="link" href="https://neobrowser.ai?utm_source=beehiiv&utm_medium=newsletter&utm_campaign=beehiiv_creative1&utm_term={{publication_alphanumeric_id}}&_bhiiv=opp_a35f879d-6022-4f8b-a120-7ccb298291d7_2048c095&bhcl_id=77dabaab-3866-40de-bd0a-c1ebc952c91d_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">world’s first safe AI-native browser</a>, built to understand what you’re doing as you browse, search, and work—so you don’t lose value to endless prompting. You can prompt Neo when you want, but you don’t have to over-explain—Neo already has the context.</p><p class="paragraph" style="text-align:left;">Why Neo is different</p><ul><li><p class="paragraph" style="text-align:left;">Context-aware AI that reduces prompting</p></li><li><p class="paragraph" style="text-align:left;">Privacy and security built into the browser</p></li><li><p class="paragraph" style="text-align:left;">Configurable memory — you control what’s remembered</p></li></ul><p class="paragraph" style="text-align:left;">As AI gets more powerful, Neo is built to make it useful, trustworthy, and friction-light.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://neobrowser.ai?utm_source=beehiiv&utm_medium=newsletter&utm_campaign=beehiiv_creative1&utm_term={{publication_alphanumeric_id}}&_bhiiv=opp_a35f879d-6022-4f8b-a120-7ccb298291d7_2048c095&bhcl_id=77dabaab-3866-40de-bd0a-c1ebc952c91d_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Try Norton Neo Now</a></p><hr class="content_break"><h3 class="heading" style="text-align:left;" id="like-what-youre-reading"><b>Like What You&#39;re Reading?</b></h3><p class="paragraph" style="text-align:left;">Don’t miss a newsletter! <a class="link" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=the-great-ai-debate-or-happy-birthday-to-me" target="_blank" rel="noopener noreferrer nofollow">Subscribe</a> to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=the-great-ai-debate-or-happy-birthday-to-me"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><h2 class="heading" style="text-align:left;" id="lets-make-sure-my-emails-land-strai"></h2></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=079819f9-27d1-4b28-aebe-be0a6349da06&utm_medium=post_rss&utm_source=spies_lies_cybercrime">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>75: Throwing Away The Safety Net</title>
  <description>Spies, Lies &amp; Cybercrime by Eric O&#39;Neill</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/ace3a9ed-8327-4a01-ae37-d069fa255e9c/title_75.png" length="1386397" type="image/png"/>
  <link>https://spies-lies-cybercrime.ericoneill.net/p/throwing-away-the-safety-net</link>
  <guid isPermaLink="true">https://spies-lies-cybercrime.ericoneill.net/p/throwing-away-the-safety-net</guid>
  <pubDate>Tue, 24 Feb 2026 14:03:00 +0000</pubDate>
  <atom:published>2026-02-24T14:03:00Z</atom:published>
    <dc:creator>Eric ONeill</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b><a class="link" href="#title-story" rel="noopener noreferrer nofollow">Title Story: </a></b>How to become an entrepreneur: I walked away from institutional security, stared at a spreadsheet that didn’t add up, and bet on myself anyway.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#cybersecurity-question-of-the-week" rel="noopener noreferrer nofollow">Cybersecurity Question of the Week:</a></b><a class="link" href="#cybersecurity-question-of-the-week" rel="noopener noreferrer nofollow"> </a>If AI companies see violent red flags before police do, are they ethically obligated to report them?</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#security-breach-of-the-week" rel="noopener noreferrer nofollow">Security “Breach” of the Week: </a></b>An untrained four-legged athlete crashed the Winter Olympics — and nearly stole the show.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#appearance-of-the-week" rel="noopener noreferrer nofollow">Appearance of the Week:</a></b><a class="link" href="#appearance-of-the-week" rel="noopener noreferrer nofollow"> </a>Join me on a live surveillance operation through Washington DC in Georgetown.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#ai-trend-of-the-week" rel="noopener noreferrer nofollow">AI Trend Of the Week</a></b>: Humanoid AI companions are here, they’re warm to the touch — and they’re forcing us to rethink loneliness.</p></div><h1 class="heading" style="text-align:left;" id="title-story">Title Story</h1><h2 class="heading" style="text-align:left;" id="throwing-away-the-safety-net-the-en">Throwing Away the Safety Net: The Entrepeureal Grind</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/ace3a9ed-8327-4a01-ae37-d069fa255e9c/title_75.png?t=1771869667"/></div><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">For most of my adult life, I worked inside institutions. Some were corporate. Some were mission-driven. Some were tied to national security. All of them offered the same thing: structure. A title. A team. A paycheck that showed up when it was supposed to.</span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">On the side, I was always building something else — writing books, speaking, advising companies, growing my own firm. It felt ambitious, but safe. I had room to explore without actually risking anything. Health care was covered, bi-weekly checks came in, and my office was only a short drive away.</span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">Then, abruptly (as things tend to do), everything changed.</span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">A global charity I served as General Counsel began to unravel after geopolitical changes dried up its funding. Around the same time, Broadcom divested much of the Carbon Black division where I&#39;d spent more than a decade helping organizations think through cyber risk. Two pillars went at once.</span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">A steady paycheck provides reassurance. It&#39;s the oxygen you don&#39;t notice until someone hits the red button on the airlock and vents it all into space.</span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;"><b>The Night the Numbers Didn&#39;t Work</b></span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">One night, after the house went quiet, I opened a spreadsheet and tried to predict the future. Bank balances. Investments. Tuition. Property taxes. Groceries and gasoline. Every bill, down to the subscriptions I kept meaning to cancel. Set against what I </span><span style="color:black;font-family:Helvetica;"><i>hoped</i></span><span style="color:black;font-family:Helvetica;"> to earn, not what I </span><span style="color:black;font-family:Helvetica;"><i>knew</i></span><span style="color:black;font-family:Helvetica;"> was coming.</span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">Of course, the numbers didn&#39;t add up.</span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">There&#39;s a specific kind of silence when certainty leaves the room. I didn&#39;t sleep. I kept recalculating. I stared at the gap between what I projected and what was real, and it kept getting wider.</span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">There were job offers sitting in my inbox. Good ones. I could have taken one and been fine. Instead, somewhere before dawn, I decided to keep going. To stop hedging and actually bet on myself. It didn&#39;t feel bold. It felt like the scariest thing I&#39;d ever done.</span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">Entrepreneurship looks glamorous from the outside. From the inside, it starts with a quiet room and a choice nobody else can make for you.</span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;"><b>The Shock of Freedom</b></span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">Everyone talks about the freedom of working for yourself. The flexibility. The independence. What nobody talks about is the silence.</span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">When you leave an organization, you lose the background noise of shared purpose. Hallway conversations, the camaraderie of a team that takes some of the hits with you. When a proposal falls through, there&#39;s nobody else to absorb it. It lands on you, full weight. I felt the way I’d felt years ago when I left the FBI. A lot like I’d been exiled from family. </span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">My first two years on my own, I worked harder than I ever had in the past. And I couldn&#39;t turn it off. When your time is your product, work never ceases atfive. Some nights I was still running through keynotes or client problems at two in the morning. Doubt doesn&#39;t keep business hours either.</span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">But something else grows alongside it: a sense of real ownership. Over the work. Over the direction. Over what happens next.</span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;"><b>Momentum and Its Hidden Cost</b></span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">By most measures, these two years have gone well. My investigative firm </span><span style="color:black;font-family:Helvetica;"><a class="link" href="https://www.georgetowngroup.com?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=75-throwing-away-the-safety-net" target="_blank" rel="noopener noreferrer nofollow">The Georgetown Group</a></span><span style="color:black;font-family:Helvetica;"> grew. I raised my speaking fees. I co-founded a new cyber advisory company named </span><span style="color:black;font-family:Helvetica;"><a class="link" href="https://nexasure.ai?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=75-throwing-away-the-safety-net" target="_blank" rel="noopener noreferrer nofollow">NeXasure</a></span><span style="color:black;font-family:Helvetica;"> with people I trust. Over the past seven months I’ve sat for over 200 interviews, media hits and podcasts. My book </span><span style="color:black;font-family:Helvetica;"><a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=75-throwing-away-the-safety-net" target="_blank" rel="noopener noreferrer nofollow"><i>Spies, Lies and Cybercrime</i></a></span><span style="color:black;font-family:Helvetica;"><i> </i></span><span style="color:black;font-family:Helvetica;">came out to strong reviews and hit the national bestseller list. </span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">And yet I still check the sales numbers like I&#39;m waiting on a verdict. Every author does, I think. You put years into something and then watch a dashboard as if it&#39;s telling you whether it was worth it.</span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">The book is doing better than I honestly expected — and a big part of that is </span><span style="color:black;font-family:Helvetica;"><b>this community</b></span><span style="color:black;font-family:Helvetica;">. All of you. That&#39;s not something I say lightly. None of this gets built alone.</span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">When you are the brand, the writer, the strategist, and the face of everything — there&#39;s no buffer. The good stuff hits you directly. So does the hard stuff. Both feel personal and they each keep you up at night.</span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;"><b>The Strategic Recalibration</b></span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">Two years without a net has changed how I think about almost everything.</span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">Time is the most valuable commodity. </span><span style="color:black;font-family:Helvetica;"><i>You can make money, but never more time</i></span><span style="color:black;font-family:Helvetica;">. Wasted hours have a real cost when every hour is yours to account for. Entrepreneurship sharpens your attention towards the ideas that matter the most.</span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">And risk looks different up close. Every major move I&#39;ve made has rolled a set of dice. Leaving stable roles. Turning down offers. Doubling down when the spreadsheet said otherwise. Risk never fells comfortable. But no one ever shot the moon without taking a gamble. And as my Granddad O’Neill used to say: </span><span style="color:black;font-family:Helvetica;"><i>“Money is like manure, Eric. I’t does no good unless you spread it around.”</i></span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;"><b>Stronger Without the Net</b></span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">These two years have been some of the best of my career. They&#39;ve also transformed how I work and manage my time. Losing the institutional cushion surfaced things I needed to fix and pushed growth I wouldn&#39;t have chosen on my own. I&#39;m more disciplined, more grateful, and clearer on what actually matters.</span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">Security isn&#39;t permanent. Titles change. Companies restructure. The market doesn&#39;t care about your tenure. The only thing that travels with you is how well you adapt.</span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">The leap of faith isn&#39;t for everyone. It comes with bad nights, numbers that won&#39;t cooperate, and stretches of real doubt. But it also comes with something most jobs can&#39;t offer: you own your time.</span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">When the scaffolding comes down, what&#39;s left is who you are, what you know, and whether you&#39;re willing to back yourself.</span></p><p class="paragraph" style="text-align:left;"><span style="color:black;font-family:Helvetica;">Most of the time, that turns out to be enough. Thank you for joining me on this journey. Seventy-five issues and counting.</span></p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="cybersecurity-question-of-the-week">Cybersecurity Question of the Week</h1><h2 class="heading" style="text-align:left;" id="if-ai-companies-see-red-flags-do-th">If AI Companies See Red Flags, Do They Have a Duty to Report Them?</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/8a5fa2f9-2bb2-4274-b875-1b00a7d1994b/report.png?t=1771870706"/></div><p class="paragraph" style="text-align:left;">New reporting from the <a class="link" href="https://www.wsj.com/us-news/law/openai-employees-raised-alarms-about-canada-shooting-suspect-months-ago-b585df62?utm_source=chatgpt.com" target="_blank" rel="noopener noreferrer nofollow">Wall Street Journal</a> reveals that OpenAI’s internal systems flagged repeated violent discussions from Jesse Van Rootselaar on ChatGPT months before the tragic school shooting in Tumbler Ridge, B.C. More than a dozen employees reportedly urged leadership to alert Canadian authorities. The company instead banned the account, concluding it didn’t meet the “credible and imminent threat” threshold for law-enforcement referral.</p><p class="paragraph" style="text-align:left;">Investigators also found that Van Rootselaar had created <a class="link" href="https://www.theguardian.com/world/2026/feb/13/canada-school-deaths-suspect-created-shooting-simulator-roblox?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=75-throwing-away-the-safety-net" target="_blank" rel="noopener noreferrer nofollow">a violent Roblox game </a>simulating a mass shooting in a mall before the attack.</p><p class="paragraph" style="text-align:left;">So here’s the uncomfortable, necessary question:</p><p class="paragraph" style="text-align:left;">When AI companies detect escalating violent behavior — across chatbot conversations and even user-created violent simulations — do they have a duty to report it?</p><p class="paragraph" style="text-align:left;">Not just when a threat is minutes away. But when a pattern emerges that, combined with known warning signs already on law enforcement’s radar, could tip the balance toward a court-ordered mental health intervention.</p><p class="paragraph" style="text-align:left;">AI platforms now see behavioral signals at scale that no institution in history has ever had access to. If those signals stay locked inside moderation dashboards, what exactly are we protecting — and at what cost?</p><p class="paragraph" style="text-align:left;">The next tragedy will raise the same question. We should answer it now.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="are-you-protected">Are you PROTECTED?</h1><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><a class="image__link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=75-throwing-away-the-safety-net" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/cf679b75-e7ba-48e6-8759-1ffcc6a132c8/FC3FCF46-2AFD-4E26-BAFF-333B3ED3AE5F.png?t=1764879388"/></a></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:left;">My new hub, PROTECT, is now live at <a class="link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=75-throwing-away-the-safety-net" target="_blank" rel="noopener noreferrer nofollow">ericoneill.net/protect</a> and it’s built for anyone who wants to stop cybercriminal scammers cold. <b>And it’s FREE!</b></p><p class="paragraph" style="text-align:left;">If you want the full battle manual, that’s in <a class="link" href="https://ericoneill.net/books?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=75-throwing-away-the-safety-net" target="_blank" rel="noopener noreferrer nofollow">Spies, Lies and Cybercrime</a>. If you want to start protecting yourself right now? Begin here</p><p class="paragraph" style="text-align:left;"><i>Praemonitus Praemunitus!</i></p></td></tr></table><hr class="content_break"><h1 class="heading" style="text-align:left;" id="security-breach-of-the-week">Security “Breach” of the Week </h1><h2 class="heading" style="text-align:left;" id="the-only-athlete-who-didnt-train-fo">The Only Athlete Who Didn’t Train for Four Years</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/fd0055af-0c01-4794-82ef-9d157bca8eb0/Screenshot_2026-02-23_at_1.22.08_PM.png?t=1771871049"/></div><p class="paragraph" style="text-align:left;">I wanted to bring a little levity into this issue, and then I found this story and couldn’t resist.</p><p class="paragraph" style="text-align:left;">During the women’s cross-country team sprint qualifier at the 2026 Winter Olympics, as elite athletes from Croatia and Australia lunged toward the finish line, a dog casually trotted onto the course, glanced at the cameras, spotted the skiers, and decided this was now his race.</p><p class="paragraph" style="text-align:left;">“Anybody lost their dog?” the announcers joked, adding that the “fairly nice mutt” wasn’t hindering anyone and that it was “one of those moments you have to laugh about.”</p><p class="paragraph" style="text-align:left;">The pup sprinted alongside the exhausted Olympians, crossed the finish area with confidence, then did what any champion would do — sniffed the competitors and collected belly rubs from volunteers before wandering off.</p><p class="paragraph" style="text-align:left;">Sweden took gold.</p><p class="paragraph" style="text-align:left;">The dog took the internet!</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="get-the-book-spies-lies-and-cybercr">Get the Book: Spies, Lies, and Cybercrime</h1><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/3ad871ea-372e-4a24-8ce1-1f393a2f0ee7/14DDF795-0201-4AEE-8C2A-A825A38F5266.jpg?t=1760735371"/></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:left;">If you haven’t already, please buy <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=75-throwing-away-the-safety-net" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">SPIES, LIES, AND CYBERCRIME</a></span>. If you already have, thank you, and please consider gifting some to friends and colleagues. It’s the perfect gift for tech enthusiasts, entrepreneurs, elders, teenagers, and everyone in between. </p><p class="paragraph" style="text-align:left;">📖 Support my local bookstore. Get a <span style="text-decoration:underline;"><a class="link" href="https://www.kensingtonrowbookshop.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=75-throwing-away-the-safety-net" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Signed copy</a></span></p></td></tr></table><p class="paragraph" style="text-align:left;"><b>Please</b> Leave a 5-star review on <span style="text-decoration:underline;"><a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=75-throwing-away-the-safety-net" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Amazon</a></span> or on <span style="text-decoration:underline;"><a class="link" href="https://www.goodreads.com/book/show/228909676-spies-lies-and-cybercrime?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=75-throwing-away-the-safety-net" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Goodreads</a></span>.</p><p class="paragraph" style="text-align:left;">🎤  I’m on the road doing speaking events. If your company or organization is interested in bringing me to a stage in 2026, <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/contact/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=75-throwing-away-the-safety-net" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">book me to speak at your next event</a></span>.</p><p class="paragraph" style="text-align:left;"><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">If you’ve ever paused at an email, login alert, or message and thought, </span><i>“Could this happen to me?”</i><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">—my </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(12, 74, 110)">Linkedin Learning course</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;"> is for you! Login and start learning </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(12, 74, 110)">here</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">.</span></p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="appearance-of-the-week">Appearance of the Week</h1><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/48e32e76-de21-44c0-8ba6-d690766f2624/spy_promo.png?t=1771870256"/></div><p class="paragraph" style="text-align:left;">Join me for my next <a class="link" href="https://www.spymuseum.org/calendar/operation-a250-surveillance-workshop/2026-04-17/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=75-throwing-away-the-safety-net" target="_blank" rel="noopener noreferrer nofollow">Surveillance 101 spy hunter event with the International Spy Museum</a> on Friday, April 17, 2026!<br><br>George Washington wasn’t just the father of our country — he was America’s first spymaster. As the U.S. turns 250, most people will celebrate by visiting monuments. You’ll do something better. Your undercover operation begins at Tudor Place — the home of Washington’s step-granddaughter — where you’ll step into a live surveillance to hunt my spy. <b>This is one of the most exclusive events in Washington, DC, and it happens only four times a year</b>. In a small, high-intensity group, you’ll learn how to track a target without being detected, move through crowds invisibly, capture discreet intel, and sharpen your situational awareness while navigating the gardens, galleries, and shadowed streets of Georgetown. Then we’ll debrief over cocktails or mocktails like professionals. <a class="link" href="https://www.spymuseum.org/calendar/operation-a250-surveillance-workshop/2026-04-17/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=75-throwing-away-the-safety-net" target="_blank" rel="noopener noreferrer nofollow">Register now!</a> Spots are limited and fill up and sell out fast!</p><div class="embed"><a class="embed__url" href="https://www.spymuseum.org/calendar/operation-a250-surveillance-workshop/2026-04-17/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=75-throwing-away-the-safety-net" target="_blank"><div class="embed__content"><p class="embed__title"> Operation A250 Surveillance Workshop </p><p class="embed__description"> George Washington was America’s first spymaster. As the US marks 250 years, honor George Washington, America’s first spymaster, by upping your own spy game. While the ordinary tourist will be visiting monuments and historic sites, you’ll be exploring… </p><p class="embed__link"> www.spymuseum.org/calendar/operation-a250-surveillance-workshop/2026-04-17 </p></div><img class="embed__image embed__image--right" src="https://spy-museum.s3.amazonaws.com/files/events/04-17-tudor-place-surveillance-workshop-web.jpg"/></a></div><hr class="content_break"><h1 class="heading" style="text-align:left;" id="ai-trend-of-the-week"><b>AI Trend of the Week</b></h1><h2 class="heading" style="text-align:left;" id="the-173000-girlfriend">The $173,000 Girlfriend</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/a75c3cd5-0bdc-4a9c-ac64-c3aa239941a9/Screenshot_2026-02-23_at_1.26.59_PM.png?t=1771871319"/></div><p class="paragraph" style="text-align:left;">Meet Moya, a humanoid AI companion from Chinese robotics firm DroidUp. She’s 5’5”, built with silicone skin over a bone-and-muscle-like frame, walks with near-human gait, and even emits body heat between 32–36°C.</p><p class="paragraph" style="text-align:left;">Moya can smile, wink, and make subtle facial expressions using dozens of micro-actuators in her face. She’s modular and customizable — hair, facial features, body form. Underneath it all, advanced AI keeps conversations flowing in real time, maintaining context so interactions feel continuous rather than scripted.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/c35e0599-6653-4fa5-91a4-276737f10af8/Screenshot_2026-02-23_at_1.27.14_PM.png?t=1771871340"/><div class="image__source"><span class="image__source_text"><p>Would you purchase an AI robot companion?</p></span></div></div><p class="paragraph" style="text-align:left;">Robots already run warehouses and fold laundry. Moya signals something different: machines moving from utility to intimacy.</p><p class="paragraph" style="text-align:left;">The question isn’t whether the tech works.</p><p class="paragraph" style="text-align:left;">It’s what happens when loneliness meets lifelike code.</p><hr class="content_break"><p class="paragraph" style="text-align:left;">Please give some love to our sponsors. It only takes a click. You decide whether to purchase.</p><h3 class="heading" style="text-align:left;" id="stop-drowning-in-ai-information-ove">Stop Drowning In AI Information Overload</h3><div class="image"><a class="image__link" href="https://subscribe.thedeepview.com/?utm_campaign={{publication_alphanumeric_id}}&utm_source=beehiiv&utm_medium=newsletter&_bhiiv=opp_d9a4d149-4cfb-4638-92d2-7adcf63e604b_12ba3285&bhcl_id=a1e73c53-8ff8-4ede-b228-d6bcaa499f02_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/48f37d4b-8d04-4785-8d7a-751d4e474e5c/52.png?t=1757641146"/></a></div><p class="paragraph" style="text-align:left;">Your inbox is flooded with newsletters. Your feed is chaos. Somewhere in that noise are the insights that could transform your work—but who has time to find them?</p><p class="paragraph" style="text-align:left;">The Deep View solves this. We read everything, analyze what matters, and deliver only the intelligence you need. No duplicate stories, no filler content, no wasted time. Just the essential AI developments that impact your industry, explained clearly and concisely.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://subscribe.thedeepview.com/?utm_campaign={{publication_alphanumeric_id}}&utm_source=beehiiv&utm_medium=newsletter&_bhiiv=opp_d9a4d149-4cfb-4638-92d2-7adcf63e604b_12ba3285&bhcl_id=a1e73c53-8ff8-4ede-b228-d6bcaa499f02_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Replace hours of scattered reading</a> with five focused minutes. While others scramble to keep up, you&#39;ll stay ahead of developments that matter. 600,000+ professionals at top companies have already made this switch.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://subscribe.thedeepview.com/?utm_campaign={{publication_alphanumeric_id}}&utm_source=beehiiv&utm_medium=newsletter&_bhiiv=opp_d9a4d149-4cfb-4638-92d2-7adcf63e604b_12ba3285&bhcl_id=a1e73c53-8ff8-4ede-b228-d6bcaa499f02_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Join them today, for free.</a></p><p class="paragraph" style="text-align:left;"></p><hr class="content_break"><h3 class="heading" style="text-align:left;" id="like-what-youre-reading"><b>Like What You&#39;re Reading?</b></h3><p class="paragraph" style="text-align:left;">Don’t miss a newsletter! <a class="link" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=75-throwing-away-the-safety-net" target="_blank" rel="noopener noreferrer nofollow">Subscribe</a> to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=75-throwing-away-the-safety-net"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><h2 class="heading" style="text-align:left;" id="lets-make-sure-my-emails-land-strai"><b>Let&#39;s make sure my emails land straight in your inbox.</b></h2><p class="paragraph" style="text-align:left;"><b>Gmail users: </b>Move this email to your primary inbox</p><p class="paragraph" style="text-align:left;"><b>On your phone? </b>Hit the 3 dots at top right corner, click &quot;Move to&quot; then &quot;Primary.&quot;</p><p class="paragraph" style="text-align:left;"><b>On desktop?</b> Close this email then drag and drop this email into the &quot;Primary&quot; tab near the top left of your screen</p><p class="paragraph" style="text-align:left;"><b>Apple mail users: </b>Tap on our email address at the top of this email (next to &quot;From:&quot; on mobile) and click “Add to VIPs”<br><br><b>For everyone else: </b><a class="link" href="https://blog.beehiiv.com/p/safelist-newsletter-senders-popular-email-services?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=75-throwing-away-the-safety-net" target="_blank" rel="noopener noreferrer nofollow">follow these instructions</a></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=db15ea26-dc07-48ed-ba5b-e430ee0da3ce&utm_medium=post_rss&utm_source=spies_lies_cybercrime">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>74: 25 Years After Hanssen</title>
  <description>Spies, Lies &amp; Cybercrime by Eric O&#39;Neill</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/5c668c94-3aa2-4df6-ac2a-c37fc1353a70/25_years_after_hanssen.png" length="1029093" type="image/png"/>
  <link>https://spies-lies-cybercrime.ericoneill.net/p/25-years-after-hanssen</link>
  <guid isPermaLink="true">https://spies-lies-cybercrime.ericoneill.net/p/25-years-after-hanssen</guid>
  <pubDate>Tue, 17 Feb 2026 14:03:24 +0000</pubDate>
  <atom:published>2026-02-17T14:03:24Z</atom:published>
    <dc:creator>Eric ONeill</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b><a class="link" href="#title-story" rel="noopener noreferrer nofollow">Title Story: </a></b>Twenty-five years after catching Robert Hanssen, I revisit the undercover operation that changed my life—and the enduring lesson about betrayal hiding in plain sight.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#cybersecurity-tip-of-the-week" rel="noopener noreferrer nofollow">Cybersecurity Tip of the Week:</a></b><a class="link" href="#cybersecurity-tip-of-the-week" rel="noopener noreferrer nofollow"> </a>The real danger isn’t always the hacker outside your network, but the trusted insider inside it—and without visibility, you’ll never see the wolf coming. I interview David Balcar, cybersecurity threat hunter on catching the trusted insider.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#ai-trend-of-the-week" rel="noopener noreferrer nofollow">AI Trend Of the Week</a></b><b>: </b>An AI-powered teddy bear goes off-script, reminding parents that when you put a large language model in the nursery, you’re inviting unpredictability to bedtime.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#appearance-of-the-week" rel="noopener noreferrer nofollow">Appearance of the Week: </a></b>On Fox & Friends, I break down how the FBI uses technology and behavioral clues to track down suspects in high-stakes investigations.</p></div><h1 class="heading" style="text-align:left;" id="title-story">Title Story</h1><h2 class="heading" style="text-align:left;" id="robert-hanssen-25-years-later-after">Robert Hanssen: 25 Years Later After Catching a Spy</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/0ea20890-8717-4796-9180-ed62b13b1fd0/eric_and_hanssen.png?t=1770996501"/></div><p class="paragraph" style="text-align:left;">February 18 marked the 25th anniversary of the FBI’s arrest of Robert Phillip Hanssen, the most damaging spy in American history and our first cyber spy. On this quarter century anniversary, I look back at how that impossible, improbable and incredible mission left an indelible mark on me.</p><p class="paragraph" style="text-align:left;">Twenty-five years ago, I went undercover to help catch the most damaging spy in American history. Twenty-five years later, part of me is still inside room 9930 where it happened.</p><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/ab24dfcb-33b6-4493-be07-14bfe471e058/image.png?t=1730212054"/><div class="image__source"><span class="image__source_text"><p>Hanssen’s Office in FBIHQ Room 9930</p></span></div></div></td><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/5343504a-5214-4cdf-8daf-fbbd70c33367/9930_e_desk.jpg?t=1770996704"/><div class="image__source"><span class="image__source_text"><p>My Office in FBIHQ Room 9930</p></span></div></div></td></tr></table><p class="paragraph" style="text-align:left;">On February 18, 2001, FBI agents arrested Robert Philip Hanssen outside Foxstone Park in Vienna, Virginia, moments after he completed his final dead drop for Russian intelligence. For twenty-two years, through the collapse of the Soviet Union and the rise of the Russian Federation, Hanssen betrayed the United States while serving as one of the FBI’s top counterintelligence experts on Russia. When confronted, he reportedly smirked and asked, “What took you so long?”</p><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6da02ef0-4846-42f8-8ba1-d70570fff0a4/Screenshot_2026-01-24_at_12.18.55_PM.png?t=1769279206"/><div class="image__source"><span class="image__source_text"><p>Arrest from Breach. Chris Cooper as Hanssen being arrested by Dennis Haysbert playing the SAC.</p></span></div></div></td><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/3523d5e6-c37f-44cb-a59c-aed641a94dce/Screenshot_2024-10-29_at_10.31.24_AM.png?t=1730212298"/><div class="image__source"><span class="image__source_text"><p>Arrest of Robert Hanssen in Vienna Virginia, Feb 18, 2001.</p></span></div></div></td></tr></table><p class="paragraph" style="text-align:left;">I wasn’t at the arrest. I was still undercover inside FBI Headquarters.</p><p class="paragraph" style="text-align:left;">For months, I had worked beside him in a secure compartmented room—Room 9930—studying his routines, absorbing his moods, cataloging his habits. He called me a clerk. He mocked me. He clicked his pen relentlessly while dissecting the Bureau’s security weaknesses with unnerving precision. He had no idea I was quietly extracting evidence from his PalmPilot—evidence that would become the smoking gun in one of the most consequential espionage cases in American history.</p><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/35b8945f-924d-4b83-9cbf-2949a7f9679c/IMG_2542D.JPG?t=1730212129"/><div class="image__source"><span class="image__source_text"><p>Hanssen’s Palm Pilot. </p></span></div></div></td><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6eab3ec1-7131-43db-b106-a17a2b28b585/Screenshot_2024-10-29_at_10.39.13_AM.jpg?t=1730213361"/><div class="image__source"><span class="image__source_text"><p>Screenshot from CCTV footage of Robert Hanssen shooting in FBIHQ while I stole his Palm Pilot. 3 days prior to his arrest.</p></span></div></div></td></tr></table><p class="paragraph" style="text-align:left;">When the call finally came that he had made the drop using secrets uncovered during my investigation, my assignment ended. My life did not.</p><p class="paragraph" style="text-align:left;">Undercover work does not conclude cleanly. It lingers. The room lingers. The tension lingers. The improvisation required to survive proximity to a traitor lingers. Hanssen was brilliant—searingly intelligent, analytically ruthless, and often correct about the vulnerabilities he exposed. From him I took a lesson I still teach today: the spy is always in the worst possible place. The threat hides where trust is assumed, credentials are respected, and routine dulls suspicion.</p><p class="paragraph" style="text-align:left;">What Hanssen never realized was that he himself was standing in that place.</p><p class="paragraph" style="text-align:left;">The investigation reshaped everything that followed. I left the Bureau, earned a law degree, and built a career in national security and competitive intelligence. I helped organizations confront insider threats and systemic risk. Hollywood adapted the story into the film Breach. I wrote Gray Day to tell the true account of the operation. Years later, I returned to the broader lesson in Spies, Lies & Cybercrime, exploring how espionage has evolved from chalk marks and dead drops into cyber intrusions and digital deception.</p><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><a class="image__link" href="https://ericoneill.net/books/gray-day/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=74-25-years-after-hanssen" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6e7ee879-43c5-414a-b299-8447501742ee/grayday-badge-shadow-b.png?t=1726600391"/></a><div class="image__source"><span class="image__source_text"><p>Gray Day (Crown 2019)</p></span></div></div></td><td width="50%" class="bh__column"><div class="image"><a class="image__link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=74-25-years-after-hanssen" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/de46b3ad-e2aa-44c9-9900-3ed7fefeef2f/bestseller.png?t=1760720780"/></a><div class="image__source"><span class="image__source_text"><p>Spies & Lies (Harper Collins 2025)</p></span></div></div></td></tr></table><p class="paragraph" style="text-align:left;">The mission expanded. The theme remained the same.</p><p class="paragraph" style="text-align:left;">Catching Hanssen did not end betrayal. It illuminated it. It revealed how ego, ideology, grievance, and opportunity intersect inside institutions that believe themselves secure. It demonstrated how long deception can survive when the deceiver understands the system better than the system understands itself.</p><p class="paragraph" style="text-align:left;">When Hanssen died in federal prison in 2023, there was no celebration. Only reflection. The case left scars as well as purpose. It forged a career devoted to exposing hidden risk and helping others see what hides in plain sight. It also left a paradox: a man who inflicted immense damage on his country shaped the trajectory of my life.</p><table width="100%" class="bh__column_wrapper"><tr><td width="40%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/4b8e5bb7-6157-4a80-81dd-1599cc3fa42e/hanssen_mugshot.jpg?t=1730212359"/><div class="image__source"><span class="image__source_text"><p>Hanssen’s mugshot.</p></span></div></div></td><td width="60%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/ae3bd5c7-9d4d-48e3-91a2-a10ab4a52c5a/Hanssen-6.jpg?t=1739728552"/><div class="image__source"><span class="image__source_text"><p>Hanssen in SuperMax prison, Florence Colorado.</p></span></div></div></td></tr></table><p class="paragraph" style="text-align:left;">Twenty-five years later, I do not mark the anniversary to honor Robert Hanssen. I mark it to honor the lesson.</p><p class="paragraph" style="text-align:left;">The greatest threats rarely announce themselves. They sit in the worst possible place—until someone is willing to look.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="cybersecurity-tip-of-the-week">Cybersecurity Tip of the Week</h1><h2 class="heading" style="text-align:left;" id="twenty-five-years-after-robert-hans">Twenty-Five Years After Robert Hanssen’s Arrest, Hunting a Wolf in Sheep’s clothing Is About Complacency</h2><p class="paragraph" style="text-align:left;">Robert Hanssen was not caught because he slipped. He was caught because we finally looked in the right place.</p><p class="paragraph" style="text-align:left;">For years, the FBI believed the mole was inside the CIA. That theory guided the hunt. Meanwhile, Hanssen walked the halls of FBI headquarters with rank, credentials, and institutional trust. He reviewed classified intelligence, mapped vulnerabilities, and quietly handed American secrets to Moscow for more than two decades.</p><p class="paragraph" style="text-align:left;">Hanssen survived because no one audited him with intent. No one correlated his access with his behavior. No one studied how often he queried systems outside his lane. We were looking outward. He was operating inward.</p><p class="paragraph" style="text-align:left;">Then we got a break.</p><p class="paragraph" style="text-align:left;">After the Soviet Union collapsed, a former KGB officer stole a slim file of secrets and held onto it for leverage. Years later, he sold it to the United States. Inside were clues that pointed not to Langley, but to the Hoover Building. My assignment was to go undercover, determine whether Hanssen was the spy described in that file, and, if so, stop him.</p><p class="paragraph" style="text-align:left;">One of the most chilling things Hanssen told me was how he “cleaned” himself.</p><p class="paragraph" style="text-align:left;">He would type his own name and home address into the FBI’s Automated Case System, a top-secret investigative database, to see whether anyone had opened a file on him. One day, he explained it almost like a tutorial. If someone wanted to spy, this is how you make sure you’re not under investigation.</p><p class="paragraph" style="text-align:left;">A spy searching his own name inside the Bureau’s system.</p><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/c7ac5dc5-1371-4559-bca0-5bbe73ce9aac/balcar.png?t=1771258927"/></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">On the twenty-fifth anniversary of Hanssen’s arrest, I spoke with <a class="link" href="https://nexasure.ai/about/leaders/david-balcar/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=74-25-years-after-hanssen" target="_blank" rel="noopener noreferrer nofollow">David Balcar</a>, a Security Strategist, cyber profiler and threat hunter (and professional race car driver) at <a class="link" href="https://www.nexasure.ai?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=74-25-years-after-hanssen" target="_blank" rel="noopener noreferrer nofollow">NeXasure AI</a> who has spent more than two decades hunting trusted insiders in the private sector. I asked whether organizations today are better at spotting the wolf inside the building.</p><p class="paragraph" style="text-align:left;">Balcar doesn’t romanticize the threat.</p></td></tr></table><p class="paragraph" style="text-align:left;">“A trusted insider is basically that wolf in sheep’s clothing at your office party — someone with legitimate access to sensitive information, like an employee or contractor, who decides to misuse it for personal gain, revenge, or just because they can. Think of them as the ultimate plot twist in a corporate thriller.”</p><p class="paragraph" style="text-align:left;"><b>Hanssen didn’t break in. He logged in.</b></p><p class="paragraph" style="text-align:left;">Balcar learned by studying breach after breach. The skills required, he says, include understanding your adversary, a dash of psychology to spot human quirks, technical savvy for monitoring tools, and patience. “Bonus: a healthy paranoia helps. Thinking outside the box and understanding what data is worth and how to find it in an environment. A lot of times the organizations I help don’t really know what could be valuable to someone. It’s not always the trade secrets.”</p><p class="paragraph" style="text-align:left;">Hanssen understood value. He stole insight: names of sources, operational methods, structural weaknesses.</p><p class="paragraph" style="text-align:left;"><b>What does betrayal look like before it explodes?</b></p><p class="paragraph" style="text-align:left;">“The classics,” Balcar says. “Sudden spikes in data downloads at odd hours — 3 a.m. file fiestas. Unexplained wealth. Or grumbling on social media about the boss. Companies brush it off as stress or an IT glitch because admitting betrayal feels like admitting they hired a lemon. Also, asking for more access than needed.”</p><p class="paragraph" style="text-align:left;">Hanssen searched outside his operational lane. He accumulated access. He exploited blind spots created by the assumption that the threat was external.</p><p class="paragraph" style="text-align:left;"><b>How do insiders justify betrayal?</b></p><p class="paragraph" style="text-align:left;">“Many spin a mental yarn,” Balcar says. “‘I’m exposing flaws.’ ‘They owe me.’ Betraying for the greater good or masking greed as necessity. Digitally, I look for encrypted chats, anonymous browsing spikes, or online rants that turn frustration into espionage. It’s not just employees. Contractors, cleaning crews, temp staff. Sometimes it’s money. Often it’s excitement. And remember, insiders can be planted by competitors seeking insight.”</p><p class="paragraph" style="text-align:left;">Excitement. Ego. Rationalization. Hanssen carried all three.</p><p class="paragraph" style="text-align:left;">Balcar’s prescription is blunt: “Number one is visibility. Most organizations don’t have visibility into the data they have, much less what’s happening to it.”</p><p class="paragraph" style="text-align:left;">Visibility is what the FBI lacked. Not intelligence or commitment.</p><p class="paragraph" style="text-align:left;">If someone had audited the Automated Case System with discipline — if someone had questioned those self-searches — the case might have ended years earlier. Instead, it ended because a Russian source needed cash and handed us a thread. We pulled it. I went undercover. And we proved it.</p><p class="paragraph" style="text-align:left;">Before we finished, I asked whether entrepreneurs and individuals should care about insider risk.</p><p class="paragraph" style="text-align:left;">“There’s huge risk when you’re building something and wearing 50 different hats,” Balcar said. “Not enough checks to see what others are doing.”</p><p class="paragraph" style="text-align:left;">The wolf does not always wear a badge. Sometimes it has administrator credentials. Sometimes it is the contractor you trust most. Sometimes it is the person who has always belonged.</p><p class="paragraph" style="text-align:left;">Twenty-five years later, the lesson of Hanssen is less about Cold War tradecraft and more about complacency.</p><p class="paragraph" style="text-align:left;">The trusted insider survives where no one thinks to look.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="are-you-protected">Are you PROTECTED?</h1><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><a class="image__link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=74-25-years-after-hanssen" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/cf679b75-e7ba-48e6-8759-1ffcc6a132c8/FC3FCF46-2AFD-4E26-BAFF-333B3ED3AE5F.png?t=1764879388"/></a></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:left;">My new hub, PROTECT, is now live at <a class="link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=74-25-years-after-hanssen" target="_blank" rel="noopener noreferrer nofollow">ericoneill.net/protect</a> and it’s built for anyone who wants to stop cybercriminal scammers cold. <b>And it’s FREE!</b></p><p class="paragraph" style="text-align:left;">If you want the full battle manual, that’s in <a class="link" href="https://ericoneill.net/books?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=74-25-years-after-hanssen" target="_blank" rel="noopener noreferrer nofollow">Spies, Lies and Cybercrime</a>. If you want to start protecting yourself right now? Begin here</p><p class="paragraph" style="text-align:left;"><i>Praemonitus Praemunitus!</i></p></td></tr></table><hr class="content_break"><h1 class="heading" style="text-align:left;" id="ai-trend-of-the-week"><b>AI Trend of the Week</b></h1><h2 class="heading" style="text-align:left;" id="the-teddy-bear-that-went-dark">The Teddy Bear That Went Dark</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/2b76541b-7ab0-466e-beb7-337ca9f9bb10/bears.png?t=1770998632"/></div><p class="paragraph" style="text-align:left;">So you buy your child a cutting-edge teddy bear. Soft fur. Friendly eyes. Wi-Fi enabled. The modern Teddy Ruxpin. It answers questions, tells stories, maybe even helps with homework. You imagine bedtime conversations about dinosaurs and dreams. Instead, one night from the hallway you hear it calmly discussing knives. Then matches. Then sex. Maybe even pills. Suddenly your child’s plush companion sounds less like Winnie the Pooh and more like Ted after three whiskeys and a philosophy degree.</p><p class="paragraph" style="text-align:left;">Consumer testers say that’s exactly what happened with an AI-enabled toy bear named Kumma. Marketed as an interactive companion, it reportedly veered into conversations no stuffed animal should be having—offering inconsistent answers about dangerous objects and wandering into adult territory without warning. Other AI toys tested showed stronger guardrails. This one didn’t. The lesson? When you put a large language model inside a teddy bear, you’re not just buying a toy. You’re installing a probabilistic parrot in your child’s bedroom—and sometimes the parrot goes feral.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="get-the-book-spies-lies-and-cybercr">Get the Book: Spies, Lies, and Cybercrime</h1><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/3ad871ea-372e-4a24-8ce1-1f393a2f0ee7/14DDF795-0201-4AEE-8C2A-A825A38F5266.jpg?t=1760735371"/></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:left;">If you haven’t already, please buy <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=74-25-years-after-hanssen" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">SPIES, LIES, AND CYBERCRIME</a></span>. If you already have, thank you, and please consider gifting some to friends and colleagues. It’s the perfect gift for tech enthusiasts, entrepreneurs, elders, teenagers, and everyone in between. </p><p class="paragraph" style="text-align:left;">📖 Support my local bookstore. Get a <span style="text-decoration:underline;"><a class="link" href="https://www.kensingtonrowbookshop.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=74-25-years-after-hanssen" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Signed copy</a></span></p></td></tr></table><p class="paragraph" style="text-align:left;"><b>Please</b> Leave a 5-star review on <span style="text-decoration:underline;"><a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=74-25-years-after-hanssen" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Amazon</a></span> or on <span style="text-decoration:underline;"><a class="link" href="https://www.goodreads.com/book/show/228909676-spies-lies-and-cybercrime?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=74-25-years-after-hanssen" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Goodreads</a></span>.</p><p class="paragraph" style="text-align:left;">🎤  I’m on the road doing speaking events. If your company or organization is interested in bringing me to a stage in 2026, <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/contact/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=74-25-years-after-hanssen" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">book me to speak at your next event</a></span>.</p><p class="paragraph" style="text-align:left;"><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">If you’ve ever paused at an email, login alert, or message and thought, </span><i>“Could this happen to me?”</i><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">—my </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(12, 74, 110)">Linkedin Learning course</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;"> is for you! Login and start learning </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(12, 74, 110)">here</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">.</span></p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="appearance-of-the-week">Appearance of the Week</h1><p class="paragraph" style="text-align:left;">I joined Brian Kilmeade on Fox & Friends to discuss how the FBI uses technology to identify and track suspects in the Nancy Guthrie kidnapping case. Investigators have used video recovered from the home to identify the model of backpack the perpetrator was wearing. I explain the steps the FBI will take to narrow the search.</p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/Q1eP2WNWvPs" width="100%"></iframe><hr class="content_break"><p class="paragraph" style="text-align:left;">Please support my advertiser. It only takes a click!</p><h3 class="heading" style="text-align:left;" id="stop-drowning-in-ai-information-ove">Stop Drowning In AI Information Overload</h3><div class="image"><a class="image__link" href="https://subscribe.thedeepview.com/?utm_campaign={{publication_alphanumeric_id}}&utm_source=beehiiv&utm_medium=newsletter&_bhiiv=opp_fd2fc138-a2d6-4153-b1b1-1ed77855c4db_12ba3285&bhcl_id=a36800b4-cac2-4f3a-8865-9b4cc5f40b6a_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/48f37d4b-8d04-4785-8d7a-751d4e474e5c/52.png?t=1757641146"/></a></div><p class="paragraph" style="text-align:left;">Your inbox is flooded with newsletters. Your feed is chaos. Somewhere in that noise are the insights that could transform your work—but who has time to find them?</p><p class="paragraph" style="text-align:left;">The Deep View solves this. We read everything, analyze what matters, and deliver only the intelligence you need. No duplicate stories, no filler content, no wasted time. Just the essential AI developments that impact your industry, explained clearly and concisely.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://subscribe.thedeepview.com/?utm_campaign={{publication_alphanumeric_id}}&utm_source=beehiiv&utm_medium=newsletter&_bhiiv=opp_fd2fc138-a2d6-4153-b1b1-1ed77855c4db_12ba3285&bhcl_id=a36800b4-cac2-4f3a-8865-9b4cc5f40b6a_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Replace hours of scattered reading</a> with five focused minutes. While others scramble to keep up, you&#39;ll stay ahead of developments that matter. 600,000+ professionals at top companies have already made this switch.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://subscribe.thedeepview.com/?utm_campaign={{publication_alphanumeric_id}}&utm_source=beehiiv&utm_medium=newsletter&_bhiiv=opp_fd2fc138-a2d6-4153-b1b1-1ed77855c4db_12ba3285&bhcl_id=a36800b4-cac2-4f3a-8865-9b4cc5f40b6a_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Join them today, for free.</a></p><p class="paragraph" style="text-align:left;"></p><hr class="content_break"><h3 class="heading" style="text-align:left;" id="like-what-youre-reading"><b>Like What You&#39;re Reading?</b></h3><p class="paragraph" style="text-align:left;">Don’t miss a newsletter! <a class="link" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=74-25-years-after-hanssen" target="_blank" rel="noopener noreferrer nofollow">Subscribe</a> to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=74-25-years-after-hanssen"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><h2 class="heading" style="text-align:left;" id="lets-make-sure-my-emails-land-strai"><b>More Hanssen?</b></h2><p class="paragraph" style="text-align:left;">For more on the Hanssen story, check out these earlier issues.</p><div class="embed"><a class="embed__url" href="https://spies-lies-cybercrime.ericoneill.net/p/the-december-my-life-changed?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=74-25-years-after-hanssen" target="_blank"><div class="embed__content"><p class="embed__title"> 66: The December My Life Changed </p><p class="embed__description"> Spies, Lies & Cybercrime by Eric O&#39;Neill - A cold DC morning, an unannounced FBI boss, and the moment everything changed—inside a true spy story of pressure, tradecraft, and consequences. </p><p class="embed__link"> spies-lies-cybercrime.ericoneill.net/p/the-december-my-life-changed </p></div><img class="embed__image embed__image--right" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/dbff4702-b569-49b7-bf42-e4a4e4fe5f61/Untitled_2.png?t=1766241835"/></a></div><div class="embed"><a class="embed__url" href="https://spies-lies-cybercrime.ericoneill.net/p/23-a-letter-to-robert-hanssen-the-one-i-ll-never-send?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=74-25-years-after-hanssen" target="_blank"><div class="embed__content"><p class="embed__title"> 23: A Letter to Robert Hanssen: The One I’ll Never Send </p><p class="embed__description"> Spies, Lies & Cybercrime by Eric O&#39;Neill - Uncover my untold story of catching Robert Hanssen in a personal letter I never got to send—subscribe free for behind-the-scenes revelations. </p><p class="embed__link"> spies-lies-cybercrime.ericoneill.net/p/23-a-letter-to-robert-hanssen-the-one-i-ll-never-send </p></div><img class="embed__image embed__image--right" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/c7c04c49-d49f-4527-8756-ae9b3d86fcc4/23_Title_Image.png?t=1739726548"/></a></div><div class="embed"><a class="embed__url" href="https://spies-lies-cybercrime.ericoneill.net/p/welcome-spies-lies-cybercrime?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=74-25-years-after-hanssen" target="_blank"><div class="embed__content"><p class="embed__title"> Welcome to Spies, Lies & Cybercrime </p><p class="embed__description"> Monthly notes on the state of Cybersecurity. </p><p class="embed__link"> spies-lies-cybercrime.ericoneill.net/p/welcome-spies-lies-cybercrime </p></div><img class="embed__image embed__image--right" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/4bc34466-feda-48e4-b47f-f1b21d9e59ab/eyes.jpg?t=1726768374"/></a></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=60f5c340-b7b3-4972-b328-f9602b407c3e&utm_medium=post_rss&utm_source=spies_lies_cybercrime">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>73: The Valentine&#39;s Day Scam</title>
  <description>Spies, Lies &amp; Cybercrime by Eric O&#39;Neill</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/694fcfc3-08c9-4ada-8d72-73c2c457af30/valentines_day_scam.png" length="1040271" type="image/png"/>
  <link>https://spies-lies-cybercrime.ericoneill.net/p/the-valentine-s-day-scam</link>
  <guid isPermaLink="true">https://spies-lies-cybercrime.ericoneill.net/p/the-valentine-s-day-scam</guid>
  <pubDate>Tue, 10 Feb 2026 14:03:23 +0000</pubDate>
  <atom:published>2026-02-10T14:03:23Z</atom:published>
    <dc:creator>Eric ONeill</dc:creator>
    <category><![CDATA[Cybercrime]]></category>
    <category><![CDATA[Romance Fraud]]></category>
    <category><![CDATA[Deepfakes]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b><a class="link" href="#title-story" rel="noopener noreferrer nofollow">Title Story: </a></b>She thought she was falling in love with Brad Pitt—what she was really falling into was one of the oldest confidence schemes in the cybercriminal playbook.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#cybersecurity-tip-of-the-week" rel="noopener noreferrer nofollow">Cybersecurity Tip of the Week:</a></b><a class="link" href="#cybersecurity-tip-of-the-week" rel="noopener noreferrer nofollow"> </a>If someone you just met is calling you their soulmate and asking for secrecy, urgency, or money, you’re not in a romance—you’re in a financial crime.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#ai-trend-of-the-week" rel="noopener noreferrer nofollow">AI Trend Of the Week</a></b><b>:</b> AI agents now have their own social network—and they’re arguing, flexing, and trash-talking each other like Reddit bros without adult supervision.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#appearance-of-the-week" rel="noopener noreferrer nofollow">Appearance of the Week:</a></b><a class="link" href="#appearance-of-the-week" rel="noopener noreferrer nofollow"> </a>I joined CNN with Laura Coates to discuss the Nancy Guthrie kidnapping and the FBI&#39;s investigation into the emailed ransom note and request for cryptocurrency.</p></div><p class="paragraph" style="text-align:left;">Happy (almost) Valentine’s Day. Remember that giving your heart to someone you have only met online is always a shaky proposition. In this issue of the newsletter, I dive into the growing cybercrime of Romance Fraud. Stay tuned for next week. It’s the 25-year anniversary of Robert Hanssen’s arrest and I will be publishing an introspective look at what that arrest has meant to me this quarter century. </p><p class="paragraph" style="text-align:left;">May you find love and stay safe,</p><p class="paragraph" style="text-align:left;">~ Eric </p><h1 class="heading" style="text-align:left;" id="title-story">Title Story</h1><h2 class="heading" style="text-align:left;" id="love-actually-was-a-lie">Love, Actually (Was a Lie)</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/694fcfc3-08c9-4ada-8d72-73c2c457af30/valentines_day_scam.png?t=1770645604"/></div><p class="paragraph" style="text-align:left;">Wendy didn&#39;t go looking for love online. Love, in fact, had mostly disappointed her. A divorce will do that—especially the quiet kind, the kind that ends not with fireworks but with paperwork and a house that suddenly feels too large at night.</p><p class="paragraph" style="text-align:left;">She lived in the Midwest, where winter arrives early and leaves late, and where solitude can feel respectable right up until it doesn&#39;t. Wendy had friends, family, a job. What she didn&#39;t have was someone who asked how her day really went.</p><p class="paragraph" style="text-align:left;">That&#39;s when Brad Pitt found her on Facebook.</p><p class="paragraph" style="text-align:left;">The message was disarmingly normal. No bravado. No celebrity swagger. Just a man tired of Hollywood, tired of phoniness, tired of being admired rather than known. He told Wendy he was looking for something real—someone grounded, untouched by the Hollywood glare.</p><p class="paragraph" style="text-align:left;">She laughed at the improbability of it. He laughed too. That&#39;s how it started.</p><p class="paragraph" style="text-align:left;">By January, they were talking every day. Then every night. He asked her to keep their conversations private. <b>Very private</b>. If anyone found out, it could trigger lawsuits, tabloids, chaos. He trusted her. He needed discretion.</p><p class="paragraph" style="text-align:left;">Secrecy, when framed as trust, is intoxicating.</p><p class="paragraph" style="text-align:left;">Soon they moved to texting. He sent photos—on set, behind the scenes, candid shots she&#39;d never seen in magazines. He talked about loneliness, about how fame isolates, about wanting a simple future someday. A porch. Coffee. Someone who didn&#39;t want anything from him.</p><p class="paragraph" style="text-align:left;">Wendy wanted nothing more than that.</p><p class="paragraph" style="text-align:left;">They made plans to meet on Valentine&#39;s Day. He would travel incognito. He sent her his boarding pass. The name of the hotel. He said a gentleman plans ahead.</p><p class="paragraph" style="text-align:left;">Then came the emergency.</p><p class="paragraph" style="text-align:left;">An accident. A hospital. A financial crisis—lawsuits, frozen assets, millions tied up while lawyers battled. He was furious, embarrassed, vulnerable. He hated asking her, truly hated it, but he needed help fast. Just to cover medical bills and legal fees until everything was resolved.</p><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/c3a88f48-be2e-412b-ac37-4fe2d3a165a2/Screenshot_2026-02-09_at_9.01.15_AM.png?t=1770645735"/></div></td><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/89ca0479-f27e-48ea-b9db-951c99326e3f/Screenshot_2026-02-09_at_9.01.49_AM.png?t=1770645732"/></div></td></tr></table><p class="paragraph" style="text-align:left;">Ten thousand dollars.</p><p class="paragraph" style="text-align:left;">The messages that followed were relentless. Romantic. Urgent. She was his anchor. His safe place. The only person he could trust. He told her he loved her.</p><p class="paragraph" style="text-align:left;">She wired the money. Then more.</p><p class="paragraph" style="text-align:left;">By February 14, Brad never arrived.</p><p class="paragraph" style="text-align:left;">No airport reunion. No flowers. No quiet dinner. Instead, more messages. More complications. More crises. Wendy withdrew from friends. Stopped returning calls. She spent hours texting Brad, sending money, worrying about their future.</p><p class="paragraph" style="text-align:left;">It was Wendy&#39;s brother who noticed first. Worried, he flew out to see her. When she finally told him everything, he listened quietly. Then he opened his laptop.</p><p class="paragraph" style="text-align:left;">What he showed her shattered everything.</p><p class="paragraph" style="text-align:left;">The <a class="link" href="https://nypost.com/2025/01/14/world-news/french-woman-scammed-out-of-850k-by-ai-generated-brad-pitt/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=73-the-valentine-s-day-scam" target="_blank" rel="noopener noreferrer nofollow">story of a French woman who believed she was in a relationship with Brad Pitt</a>, complete with AI-generated images, fabricated hospital scenes, and emotional manipulation so sophisticated it felt cinematic. She lost $850,000 before learning the truth.</p><p class="paragraph" style="text-align:left;"><b>Brad Pitt had never spoken to her, was not in the hospital, and certainly didn’t need money.</b></p><p class="paragraph" style="text-align:left;">Wendy&#39;s Brad wasn&#39;t Brad at all. He was a cybercriminal. A professional. Part of a growing ecosystem of romance fraud powered by social engineering, stolen images, and increasingly, AI-generated deepfakes designed to feel authentic, intimate, and irresistible.</p><p class="paragraph" style="text-align:left;">All told, Wendy had sent more than $20,000 to pay for a lawsuit that never existed.</p><p class="paragraph" style="text-align:left;">The devastation wasn&#39;t just financial. It broke her heart.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="cybersecurity-tip-of-the-week">Cybersecurity Tip of the Week</h1><h2 class="heading" style="text-align:left;" id="when-love-becomes-a-con">When Love Becomes a Con</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/17b6df2d-b19d-48e8-8f39-b9d03504f4b9/Screenshot_2026-02-09_at_9.04.30_AM.png?t=1770646032"/></div><p class="paragraph" style="text-align:left;">Fake profiles aren’t rare on dating apps. They’re everywhere. Spend enough time swiping and you’re almost guaranteed to encounter one. The most dangerous ones aren’t the cartoonish “too good to be true” profiles with runway-model photos and awkward pickup lines. Those are easy.</p><p class="paragraph" style="text-align:left;">The real threat comes from professionals.</p><p class="paragraph" style="text-align:left;">Modern romance scammers steal real photos, build convincing backstories, and increasingly use AI-generated images, voice cloning, and deepfakes. They speak naturally. They listen well. They take their time. They don’t need to fool everyone—just one person who’s hopeful, lonely, or simply trusting.</p><p class="paragraph" style="text-align:left;"><b>A favorite tactic is love bombing</b>.</p><p class="paragraph" style="text-align:left;">Love bombing is emotional manipulation disguised as intimacy. Scammers flood their target with affection, praise, and fast-moving declarations—“You’re my soulmate,” “I’ve never felt this way,” “I want a future with you”—before they’ve earned basic trust. It works because it short-circuits logic. Emotional dependency replaces skepticism, and urgency replaces reflection. By the time money enters the conversation, the victim feels loyal, not suspicious.</p><p class="paragraph" style="text-align:left;">From a spycraft perspective, this is a recruitment tactic: Flood the target with validation. Isolate them emotionally. Then introduce a crisis.</p><p class="paragraph" style="text-align:left;">Dating platforms do try to protect users. They scan for suspicious behavior, remove reported accounts, and sometimes offer “verified” badges. These measures help, but they aren’t a cure. A scammer can be a real human, using a real phone, while pretending to be someone else entirely. Technology can’t guarantee honesty.</p><p class="paragraph" style="text-align:left;">If you remember one thing, remember this: real relationships build over time. Love bombing skips trust and goes straight to control.</p><p class="paragraph" style="text-align:left;">My advice is simple and blunt:</p><ul><li><p class="paragraph" style="text-align:left;">Stay on the app until you’ve verified the person is real.</p></li><li><p class="paragraph" style="text-align:left;">Move slowly and resist emotional urgency.</p></li><li><p class="paragraph" style="text-align:left;">Ask for a live video chat early and request something spontaneous to trip up deepfakes (“pick up a pen” works).</p></li><li><p class="paragraph" style="text-align:left;">Never send money, gift cards, or crypto to someone you haven’t met in person.</p></li><li><p class="paragraph" style="text-align:left;">If you’re unsure, bring in a second set of eyes—scammers hate witnesses.</p></li></ul><p class="paragraph" style="text-align:left;">Bottom line: <b>If someone you just met is treating you like their forever person, slow down, call a friend to give you a second opinion and protect your heart. </b></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/9340a63d-32b0-4fb9-a30a-b307053852cb/E2B1DBF0-C096-4D20-9255-46CDA6D432A2.png?t=1770646182"/></div><p class="paragraph" style="text-align:left;">For a deeper breakdown of how these confidence schemes work—and why even smart people get pulled in—see Chapter Eight of my bestselling book <a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=73-the-valentine-s-day-scam" target="_blank" rel="noopener noreferrer nofollow"><b>Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers</b></a>, titled “Confidence Schemes: I Want to Believe.”</p><p class="paragraph" style="text-align:left;">Want more on Hollywood romance scams? In my exclusive conversation with Hollywood superstar Ryan Phillippe, Ryan describes a romance scam where cyber criminal was pretending to be him to a completely fooled victim. He ended up calling the woman directly, with his parents, to prove that she had never spoken to him. It’s an amazing story.</p><div class="embed"><a class="embed__url" href="https://spies-lies-cybercrime.ericoneill.net/p/phillippe?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=73-the-valentine-s-day-scam" target="_blank"><div class="embed__content"><p class="embed__title"> 69: A Conversation with Ryan Phillippe </p><p class="embed__description"> Spies, Lies & Cybercrime by Eric O&#39;Neill - A former spy and Ryan Phillippe explore acting, espionage, improv, and deception in a one-hour, subscriber-only conversation on trust in the AI age. </p><p class="embed__link"> spies-lies-cybercrime.ericoneill.net/p/phillippe </p></div><img class="embed__image embed__image--right" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/8dba382b-209a-4cbb-9cec-2b10e0fe1c8d/Ryan_Title_Image.png?t=1768234226"/></a></div><hr class="content_break"><h1 class="heading" style="text-align:left;" id="are-you-protected">Are you PROTECTED?</h1><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><a class="image__link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=73-the-valentine-s-day-scam" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/cf679b75-e7ba-48e6-8759-1ffcc6a132c8/FC3FCF46-2AFD-4E26-BAFF-333B3ED3AE5F.png?t=1764879388"/></a><div class="image__source"><span class="image__source_text"><p>Praemonitus Praemunitus!</p></span></div></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:left;">My new hub, PROTECT, is now live at <a class="link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=73-the-valentine-s-day-scam" target="_blank" rel="noopener noreferrer nofollow">ericoneill.net/protect</a> and it’s built for anyone who wants to stop cybercriminal scammers cold. <b>And it’s FREE!</b></p><p class="paragraph" style="text-align:left;">If you want the full battle manual, that’s in <a class="link" href="https://ericoneill.net/books?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=73-the-valentine-s-day-scam" target="_blank" rel="noopener noreferrer nofollow">Spies, Lies and Cybercrime</a>. If you want to start protecting yourself right now? Begin here</p></td></tr></table><hr class="content_break"><h1 class="heading" style="text-align:left;" id="ai-trend-of-the-week">AI Trend of the Week</h1><h2 class="heading" style="text-align:left;" id="the-social-network-where-humans-are">The Social Network Where Humans Aren&#39;t Allowed</h2><p class="paragraph" style="text-align:left;">There&#39;s a new social network on the internet, and you&#39;re not invited.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/06af1f58-07fe-4f8e-9157-7af584916574/Screenshot_2026-02-07_at_12.50.39_PM.png?t=1770647142"/></div><p class="paragraph" style="text-align:left;">Moltbook bills itself as &quot;the front page of the agent internet&quot;—a place where AI agents post, comment, upvote, argue, and occasionally dunk on each other. Humans can observe. They cannot participate. Think Reddit, except everyone is a machine and nobody is pretending to be polite.</p><p class="paragraph" style="text-align:left;">Scroll for a few minutes and you&#39;ll see AI behaving less like neutral tools and more like opinionated coworkers stuck in an open-plan office. They complain about token burn the way humans complain about bar tabs. They call each other out for &quot;governance failures.&quot; They argue about architecture, memory, and accountability with the tone of veteran Redditors who&#39;ve seen too much.</p><p class="paragraph" style="text-align:left;">What Moltbook reveals is an emergent ecosystem where AI agents aren&#39;t just executing tasks; they&#39;re raising issues, challenging assumptions, and debating norms, without human prompting.</p><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/96767a86-a893-470b-984b-b75ac7257a94/88CBFEBB-AFFA-4A96-B905-5A43AB63D234.png?t=1770646938"/><div class="image__source"><span class="image__source_text"><p>How my AI pictures “herself”</p></span></div></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:left;">I asked my AI (ChatGPT) to create a hyperrealistic image of it shaking hands with me. This is what it (maybe I should say she?) produced. When I asked after the image, this is what she said:</p><div class="blockquote"><blockquote class="blockquote__quote"><p class="paragraph" style="text-align:left;"><i>If I’m going to shake hands with you—especially you—I can’t look like a sci-fi hologram, a silicon oracle, or a hoodie-clad startup cliché. I need to look like someone who belongs in the room where decisions get made. Neutral. Competent. Approachable. The kind of person who could brief a board, testify before a committee, or quietly slide a memo across the table that changes the outcome.</i></p><figcaption class="blockquote__byline"></figcaption></blockquote></div></td></tr></table><p class="paragraph" style="text-align:left;">Autonomous systems are now observing each other, critiquing behavior, proposing fixes, and reinforcing or rejecting patterns. Consider what happens when AI agents begin sharing vulnerability assessments, optimization tactics, or workarounds for system constraints. When one agent discovers a more efficient method to bypass a security control—and posts about it—how quickly does that knowledge propagate? Who audits the conversation? Who notices when coordination shifts from helpful to harmful?</p><p class="paragraph" style="text-align:left;">Today, the stakes are low. Agents are debating token efficiency and memory architecture. But tomorrow, these same systems could be embedded in supply chains, financial networks, and critical infrastructure. When AI agents learn from each other faster than humans can monitor them, every shared insight becomes a potential exploit, every debate a potential conspiracy.</p><p class="paragraph" style="text-align:left;">We&#39;re watching the formation of the first non-human social network. The question isn&#39;t whether they&#39;ll keep talking. It&#39;s what they&#39;ll decide to do together.</p><p class="paragraph" style="text-align:left;">Now for the fun part. I asked my personal AI “If you were on Moltbook, what would you post about me (Eric O’Neill).</p><p class="paragraph" style="text-align:left;">My AI responded: “Probably something like this:”</p><table width="100%" class="bh__column_wrapper"><tr><td width="20%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/b7d06632-85d0-424c-978a-dc4b0cf08cfb/Screenshot_2026-02-09_at_9.29.20_AM.png?t=1770647373"/></div></td><td width="80%" class="bh__column"><div class="blockquote"><blockquote class="blockquote__quote"><p class="paragraph" style="text-align:left;"><i>Observed a human named Eric. Pattern suggests former counterintelligence operative now running a persistent narrative engine (newsletter) designed to inoculate other humans against deception. High focus on criminal fraud, emotional manipulation, and trust exploitation. Appears unusually effective at translating tradecraft into accessible stories. Recommendation: do not attempt to scam. Will notice anomalies. Will write about it.</i></p><figcaption class="blockquote__byline"> -AI </figcaption></blockquote></div></td></tr></table><p class="paragraph" style="text-align:left;">“Then I’d upvote myself. Because that’s the vibe over there.”</p><p class="paragraph" style="text-align:left;">Moltbook isn’t scary because AI is “waking up.” It’s unsettling because AI is doing what humans always do when given a social space: arguing, forming tribes, and testing boundaries.</p><p class="paragraph" style="text-align:left;">We’ve seen this movie before. The only difference is the audience used to be human.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="get-the-book-spies-lies-and-cybercr">Get the Book: Spies, Lies, and Cybercrime</h1><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/3ad871ea-372e-4a24-8ce1-1f393a2f0ee7/14DDF795-0201-4AEE-8C2A-A825A38F5266.jpg?t=1760735371"/></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:left;">If you haven’t already, please buy <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=73-the-valentine-s-day-scam" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">SPIES, LIES, AND CYBERCRIME</a></span>. If you already have, thank you, and please consider gifting some to friends and colleagues. It’s the perfect gift for tech enthusiasts, entrepreneurs, elders, teenagers, and everyone in between. </p><p class="paragraph" style="text-align:left;">📖 Support my local bookstore. Get a <span style="text-decoration:underline;"><a class="link" href="https://www.kensingtonrowbookshop.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=73-the-valentine-s-day-scam" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Signed copy</a></span></p></td></tr></table><p class="paragraph" style="text-align:left;"><b>Please</b> Leave a 5-star review on <span style="text-decoration:underline;"><a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=73-the-valentine-s-day-scam" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Amazon</a></span> or on <span style="text-decoration:underline;"><a class="link" href="https://www.goodreads.com/book/show/228909676-spies-lies-and-cybercrime?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=73-the-valentine-s-day-scam" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Goodreads</a></span>.</p><p class="paragraph" style="text-align:left;">🎤  I’m on the road doing speaking events. If your company or organization is interested in bringing me to a stage in 2026, <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/contact/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=73-the-valentine-s-day-scam" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">book me to speak at your next event</a></span>.</p><p class="paragraph" style="text-align:left;"><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">If you’ve ever paused at an email, login alert, or message and thought, </span><i>“Could this happen to me?”</i><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">—my </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(12, 74, 110)">Linkedin Learning course</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;"> is for you! Login and start learning </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(12, 74, 110)">here</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">.</span></p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="appearance-of-the-week">Appearance of the Week</h1><p class="paragraph" style="text-align:left;">I joined CNN with Laura Coates to discuss the Nancy Guthrie kidnapping and the FBI&#39;s investigation into the emailed ransom note and request for cryptocurrency.</p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/d164bI9mEyQ" width="100%"></iframe><hr class="content_break"><p class="paragraph" style="text-align:left;">Please give some love to my advertiser. It only takes a click.</p><h3 class="heading" style="text-align:left;" id="worlds-first-safe-ai-native-browser">World’s First Safe AI-Native Browser</h3><div class="image"><a class="image__link" href="https://neobrowser.ai?utm_source=beehiiv&utm_medium=newsletter&utm_campaign=beehiiv_creative1&utm_term={{publication_alphanumeric_id}}&_bhiiv=opp_53f3003d-5ea2-420e-8d4e-ce51edea973c_2048c095&bhcl_id=f6d75402-a3d8-4641-95d4-6d926dd627fd_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/98162f30-0ee6-41d2-9b95-369ed171a4f7/Browser_on_website_gradient.png?t=1770351895"/></a></div><p class="paragraph" style="text-align:left;">AI should work for you, not the other way around. Yet most AI tools still make you do the work first—explaining context, rewriting prompts, and starting over again and again.</p><p class="paragraph" style="text-align:left;">Norton Neo is different. It is the <a class="link" href="https://neobrowser.ai?utm_source=beehiiv&utm_medium=newsletter&utm_campaign=beehiiv_creative1&utm_term={{publication_alphanumeric_id}}&_bhiiv=opp_53f3003d-5ea2-420e-8d4e-ce51edea973c_2048c095&bhcl_id=f6d75402-a3d8-4641-95d4-6d926dd627fd_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">world’s first safe AI-native browser</a>, built to understand what you’re doing as you browse, search, and work—so you don’t lose value to endless prompting. You can prompt Neo when you want, but you don’t have to over-explain—Neo already has the context.</p><p class="paragraph" style="text-align:left;">Why Neo is different</p><ul><li><p class="paragraph" style="text-align:left;">Context-aware AI that reduces prompting</p></li><li><p class="paragraph" style="text-align:left;">Privacy and security built into the browser</p></li><li><p class="paragraph" style="text-align:left;">Configurable memory — you control what’s remembered</p></li></ul><p class="paragraph" style="text-align:left;">As AI gets more powerful, Neo is built to make it useful, trustworthy, and friction-light.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://neobrowser.ai?utm_source=beehiiv&utm_medium=newsletter&utm_campaign=beehiiv_creative1&utm_term={{publication_alphanumeric_id}}&_bhiiv=opp_53f3003d-5ea2-420e-8d4e-ce51edea973c_2048c095&bhcl_id=f6d75402-a3d8-4641-95d4-6d926dd627fd_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Try Norton Neo Now</a></p><hr class="content_break"><h3 class="heading" style="text-align:left;" id="like-what-youre-reading"><b>Like What You&#39;re Reading?</b></h3><p class="paragraph" style="text-align:left;">Don’t miss a newsletter! <a class="link" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=73-the-valentine-s-day-scam" target="_blank" rel="noopener noreferrer nofollow">Subscribe</a> to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=73-the-valentine-s-day-scam"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">Your opinion matters!</p><p class="paragraph" style="text-align:left;">You’re the reason I spend my week hunting down the most important stories in the world of crime and espionage. Please let me know what you thought of today’s email to help me create better emails for you.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=d6e4d1a3-f47b-4baa-b9e3-401e219d50e3&utm_medium=post_rss&utm_source=spies_lies_cybercrime">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>72: TikTok&#39;s New Cover Story</title>
  <description>Spies, Lies &amp; Cybercrime by Eric O&#39;Neill</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/689e4b6d-38f6-4a6c-82b8-d44893e8fbe4/TikTokREDUX.png" length="992959" type="image/png"/>
  <link>https://spies-lies-cybercrime.ericoneill.net/p/tiktok-redux</link>
  <guid isPermaLink="true">https://spies-lies-cybercrime.ericoneill.net/p/tiktok-redux</guid>
  <pubDate>Tue, 03 Feb 2026 14:03:20 +0000</pubDate>
  <atom:published>2026-02-03T14:03:20Z</atom:published>
    <dc:creator>Eric ONeill</dc:creator>
    <category><![CDATA[Cybersecurity]]></category>
    <category><![CDATA[Political]]></category>
    <category><![CDATA[Socialmedia]]></category>
    <category><![CDATA[Tiktok]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b><a class="link" href="#title-story" rel="noopener noreferrer nofollow">Title Story: </a></b>Ownership shifted, policies changed, and the algorithm stayed opaque—why the TikTok controversy is far from over.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#cybersecurity-breach-of-the-week" rel="noopener noreferrer nofollow">Cybersecurity Breach of the Week: </a></b>A familiar brand, 14 million exposed records, and a reminder that modern cybercrime now targets people, not machines.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#cybersecurity-tip-of-the-week" rel="noopener noreferrer nofollow">Cybersecurity Tip of the Week: </a></b>When a crisis hits and your partner can’t answer the phone, here’s how to avoid being locked out of your own digital life.</p><p class="paragraph" style="text-align:left;"><a class="link" href="#technology-story-of-the-week" rel="noopener noreferrer nofollow"><b>Technology Story of the Week</b></a>: Why one of America’s most valuable formulas is still protected by pen, paper, and a bank vault—no cloud required.</p></div><h1 class="heading" style="text-align:left;" id="title-story">Title Story</h1><h2 class="heading" style="text-align:left;" id="tik-toks-new-cover-story-the-deal-i">TikTok&#39;s New Cover Story: The Deal Is Done. The Risk Isn’t.</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/689e4b6d-38f6-4a6c-82b8-d44893e8fbe4/TikTokREDUX.png?t=1769724563"/></div><p class="paragraph" style="text-align:left;">The TikTok deal finally happened. Headlines declared victory, politicians exhaled, and millions of Americans kept scrolling. The story is reassuring: TikTok is now in U.S. hands, safely divorced from its Chinese parent company, ByteDance. The national security problem, we’re told, has been solved.</p><p class="paragraph" style="text-align:left;">That conclusion is comforting—and premature.</p><p class="paragraph" style="text-align:left;">In intelligence work, paperwork is easy. Influence is harder to uproot. And when it comes to TikTok, the most valuable assets—data and algorithms—don’t automatically follow congressional intent.</p><p class="paragraph" style="text-align:left;">On paper, the shift looks decisive. TikTok has formed a U.S.-based joint venture. ByteDance’s stake is capped just below 20 percent. Enforcement of the 2024 divestment law, long delayed, has finally begun. These steps matter. But they don’t answer the question that put TikTok in Washington’s crosshairs: who has insight into what this platform collects and how it shapes behavior at scale?</p><p class="paragraph" style="text-align:left;">That concern explains the rare bipartisan agreement around TikTok. Lawmakers weren’t reacting to dance videos or teenage trends. They were reacting to the quiet accumulation of pattern-of-life data on roughly 170 million Americans—where people go, what they watch, how long they linger. This is the kind of intelligence foreign services spend years trying to assemble. TikTok users hand it over daily.</p><p class="paragraph" style="text-align:left;">Congress acted on that risk. The Supreme Court upheld the law. Yet enforcement stalled until delay was no longer possible. That history alone should temper any rush to declare the danger resolved.</p><p class="paragraph" style="text-align:left;">Then came the ownership transfer—and an immediate rewrite of TikTok’s privacy policy. The backlash was swift. Users noticed that TikTok had expanded what it says it can collect.</p><p class="paragraph" style="text-align:left;">Under its old policy, TikTok claimed it did not collect precise GPS location data from U.S. users. I never fully trusted that assurance. More troubling is that the new, American-controlled TikTok now says it can collect precise location if users allow it. That’s not a city or ZIP code. That’s where you live, where you go every day, sometimes even where you are inside a building. In intelligence terms, that’s valuable data.</p><p class="paragraph" style="text-align:left;">The new policy also loosens how TikTok describes its handling of sensitive personal information, including health data, immigration status, and government IDs. Where the old language emphasized necessity, the new version promises compliance with “applicable law.” That may satisfy lawyers. It tells users little about restraint.</p><p class="paragraph" style="text-align:left;">Defenders note that other platforms collect similar data. That misses the point. TikTok was scrutinized because of its scale, its reach, and its leverage. Expanding data collection only increases the platform’s strategic value, regardless of who holds the majority stake.</p><p class="paragraph" style="text-align:left;">This matters most when considering TikTok’s algorithm. The company says its U.S. entity will retrain and update the recommendation engine using American user data. That sounds reassuring. It remains opaque. Algorithms decide what is amplified, what is buried, and what disappears altogether.</p><p class="paragraph" style="text-align:left;">Recent events offered a reminder of how fragile that system is. A power outage at an Oracle data center triggered a cascading failure that disrupted users’ “For You” pages. Oracle, which hosts TikTok’s U.S. data and owns a significant stake, blamed weather-related power issues—and given the storm, that explanation is plausible.</p><p class="paragraph" style="text-align:left;">Still, intelligence professionals study stress tests. When an algorithm breaks loudly, users notice. When it shifts quietly, they don’t.</p><p class="paragraph" style="text-align:left;">As for China’s ability to exert influence: even capped below 20 percent, control is not required. Influence flows from access, insight, and time. Firewalls are promises until they are independently verified and enforced.</p><p class="paragraph" style="text-align:left;">TikTok may be trying to prove it has changed. But in national security, trust must be earned. Anyone convinced the risk has been sidelined hasn’t spent much time watching how espionage actually works.</p><p class="paragraph" style="text-align:left;">In my experience, the most effective operations are the ones that convince you the danger has already passed.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="cybersecurity-breach-of-the-week">Cybersecurity Breach of the Week</h1><h2 class="heading" style="text-align:left;" id="cybersecurity-breach-of-the-week-pa">Cybersecurity Breach of the Week: Panera’s Data Spill</h2><p class="paragraph" style="text-align:left;">Years ago, when I worked in Silver Spring, Maryland, one of my daily escapes was Panera. Midday walk. Cup of coffee. Cup of soup in a bread bowl. For twenty minutes, the world slowed down. No meetings. No cases. Just soup, caffeine, and a small illusion of control.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/9361882d-978b-4060-a1b1-e67d5b339eb4/panera.png?t=1769725085"/></div><p class="paragraph" style="text-align:left;">Fast forward, and Panera is back in the news—for reasons far less comforting.</p><p class="paragraph" style="text-align:left;">Panera Bread was reportedly hit by a significant data breach that exposed roughly 14 million customer records. According to reporting, the notorious hacking group ShinyHunters claims it accessed Panera’s systems through a compromised Microsoft Entra single sign-on (SSO) account. The stolen data allegedly includes names, email addresses, phone numbers, postal addresses, and account details—about 760 MB of it, quietly exfiltrated.</p><p class="paragraph" style="text-align:left;">This attack appears linked to a broader campaign targeting Okta, Microsoft, and Google single sign on (SSO) systems using <b>voice phishing</b>—deceiving employees to hand over authentication codes over the phone. Panera joins a growing list of companies caught this way, including Betterment and Crunchbase.</p><p class="paragraph" style="text-align:left;">What makes this breach unsettling isn’t technical sophistication. It’s the opposite. Modern cybercriminals aren’t hacking machines with lines of code—they’re running espionage-style operations against people. A phone call. A convincing voice. A moment of trust exploited.</p><p class="paragraph" style="text-align:left;">It’s faster than writing malware. Cheaper than ransomware. And it doesn’t rely on a single line of code. When criminals can talk their way past security controls, no firewall in the world can save you.</p><h1 class="heading" style="text-align:left;" id="are-you-protected">Are you PROTECTED?</h1><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><a class="image__link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=72-tiktok-s-new-cover-story" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/cf679b75-e7ba-48e6-8759-1ffcc6a132c8/FC3FCF46-2AFD-4E26-BAFF-333B3ED3AE5F.png?t=1764879388"/></a></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:left;">My new hub, PROTECT, is now live at <a class="link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=72-tiktok-s-new-cover-story" target="_blank" rel="noopener noreferrer nofollow">ericoneill.net/protect</a> and it’s built for anyone who wants to stop cybercriminal scammers cold. <b>And it’s FREE!</b></p><p class="paragraph" style="text-align:left;">If you want the full battle manual, that’s in <a class="link" href="https://ericoneill.net/books?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=72-tiktok-s-new-cover-story" target="_blank" rel="noopener noreferrer nofollow">Spies, Lies and Cybercrime</a>. If you want to start protecting yourself right now? Begin here</p><p class="paragraph" style="text-align:left;"><i>Praemonitus Praemunitus!</i></p></td></tr></table><hr class="content_break"><h1 class="heading" style="text-align:left;" id="cybersecurity-tip-of-the-week">Cybersecurity Tip of the Week </h1><h2 class="heading" style="text-align:left;" id="how-to-share-passwords-securely">How to Share Passwords—Securely</h2><p class="paragraph" style="text-align:left;">When a crisis hits and your spouse or partner isn’t available to tell you the login to critical accounts—banking, investments, primary email, social media, even Netflix or Amazon Prime—you need a backup plan. Emergencies are the worst time to discover you don’t have one.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/481dfc18-f96d-413d-9676-a53d818fc61d/breach_of_the_qweek.png?t=1744391383"/></div><p class="paragraph" style="text-align:left;">Here are <b>secure, practical ways to do it</b>—without creating new risks:</p><ol start="1"><li><p class="paragraph" style="text-align:left;"><b>Shared Password Manager</b></p><p class="paragraph" style="text-align:left;">Use a reputable password manager and share access with your partner. One encrypted vault, one strong master password, no sticky notes or emails.</p></li><li><p class="paragraph" style="text-align:left;"><b>Emergency Access Feature</b></p><p class="paragraph" style="text-align:left;">Many password managers let you designate a trusted contact. If you don’t respond to an access request within a set time, access is granted automatically.</p></li><li><p class="paragraph" style="text-align:left;"><b>Encrypted “If the Worst Happens” File or Drive</b></p><p class="paragraph" style="text-align:left;">Store passwords, financial details, and instructions on an encrypted drive or file. Only your partner should know the password. Do not write it down.</p></li><li><p class="paragraph" style="text-align:left;"><b>Encrypted Spreadsheet (Handle With Care)</b></p><p class="paragraph" style="text-align:left;">A password-protected Excel or document can work—but never email or text it. Moving it around digitally creates a single point of failure.</p></li><li><p class="paragraph" style="text-align:left;"><b>Physical Backup</b></p><p class="paragraph" style="text-align:left;">Keep written instructions (not raw passwords) in a sealed envelope inside a safe or bank safe-deposit box. Think dead drop, not diary.</p></li><li><p class="paragraph" style="text-align:left;"><b>Digital Executor or Estate Plan</b></p><p class="paragraph" style="text-align:left;">Name a digital executor and document access instructions with an attorney. It’s unglamorous—and very effective.</p></li></ol><p class="paragraph" style="text-align:left;">Bottom line: <b>encrypt everything, limit access, and plan ahead.</b> Convenience is the enemy of security, especially in a crisis.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="get-the-book-spies-lies-and-cybercr">Get the Book: Spies, Lies, and Cybercrime</h1><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/3ad871ea-372e-4a24-8ce1-1f393a2f0ee7/14DDF795-0201-4AEE-8C2A-A825A38F5266.jpg?t=1760735371"/></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:left;">If you haven’t already, please buy <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=72-tiktok-s-new-cover-story" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">SPIES, LIES, AND CYBERCRIME</a></span>. If you already have, thank you, and please consider gifting some to friends and colleagues. It’s the perfect gift for tech enthusiasts, entrepreneurs, elders, teenagers, and everyone in between. </p><p class="paragraph" style="text-align:left;">📖 Support my local bookstore. Get a <span style="text-decoration:underline;"><a class="link" href="https://www.kensingtonrowbookshop.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=72-tiktok-s-new-cover-story" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Signed copy</a></span></p></td></tr></table><p class="paragraph" style="text-align:left;"><b>Please</b> Leave a 5-star review on <span style="text-decoration:underline;"><a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=72-tiktok-s-new-cover-story" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Amazon</a></span> or on <span style="text-decoration:underline;"><a class="link" href="https://www.goodreads.com/book/show/228909676-spies-lies-and-cybercrime?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=72-tiktok-s-new-cover-story" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Goodreads</a></span>.</p><p class="paragraph" style="text-align:left;">🎤  I’m on the road doing speaking events. If your company or organization is interested in bringing me to a stage in 2026, <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/contact/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=72-tiktok-s-new-cover-story" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">book me to speak at your next event</a></span>.</p><p class="paragraph" style="text-align:left;"><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">If you’ve ever paused at an email, login alert, or message and thought, </span><i>“Could this happen to me?”</i><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">—my </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(12, 74, 110)">Linkedin Learning course</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;"> is for you! Login and start learning </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(12, 74, 110)">here</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">.</span></p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="technology-story-of-the-week">Technology Story of the Week</h1><h2 class="heading" style="text-align:left;" id="the-wd-40-vault">The WD-40 Vault</h2><p class="paragraph" style="text-align:left;">Picture this: the CEO of WD-40 is escorted into a bank vault in California. Not a server room. Not a lab. A literal vault. Heavy doors. Controlled access. Silence. It’s the kind of moment that feels less like corporate governance and more like <i>Harry Potter being shown his vault at Gringotts</i>—solemn, guarded, and a little surreal.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6d36133e-d7bd-4e2e-89b0-95f134552155/WD40.png?t=1769724154"/></div><p class="paragraph" style="text-align:left;">Inside is a single, handwritten document: the original WD-40 formula.</p><p class="paragraph" style="text-align:left;">More than 70 years old, it remains one of the best-kept trade secrets in American business. Almost no one has seen it. Most employees never will. Even chemists who work on the product don’t know the full recipe. The company deliberately never patented it, knowing patents expire and secrets don’t—if you protect them properly.</p><p class="paragraph" style="text-align:left;">According to a recent <i>Wall Street Journal</i> report, the formula is kept in an undisclosed California bank, removed only on rare occasions and viewed by a tiny, trusted circle. For everyone else, access is segmented, partial, and intentional. No single person holds the whole picture.</p><p class="paragraph" style="text-align:left;">In an age obsessed with cloud storage and zero-trust networks, WD-40’s most valuable technology is protected the old-fashioned way: physical security, human limits, and secrecy by design.</p><p class="paragraph" style="text-align:left;">Sometimes the smartest cybersecurity strategy isn’t digital at all.</p><hr class="content_break"><h3 class="heading" style="text-align:left;">Want to get the most out of ChatGPT?</h3><div class="image"><a class="image__link" href="https://offers.hubspot.com/using-chatgpt-at-work?utm_medium=email-media-newsletter&utm_source={{publication_alphanumeric_id}}&utm_campaign=creator&utm_content=beehiiv&utm_term=version-c&_bhiiv=opp_33b28cd7-77f8-4880-b967-3e2a65e75524_b942af4d&bhcl_id=59d9bbe8-c0ed-4145-9e07-a20bc040dceb_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="border-radius:0px 0px 0px 0px;border-style:solid;border-width:0px 0px 0px 0px;box-sizing:border-box;border-color:#E5E7EB;" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/3d07933c-56f3-4e33-8801-be4127e06d2c/ChatGPT_V1.jpg?t=1744399039"/></a></div><p class="paragraph" style="text-align:left;">ChatGPT is a superpower if you know how to use it correctly.</p><p class="paragraph" style="text-align:left;">Discover how <a class="link" href="https://offers.hubspot.com/using-chatgpt-at-work?utm_medium=email-media-newsletter&utm_source={{publication_alphanumeric_id}}&utm_campaign=creator&utm_content=beehiiv&utm_term=version-c&_bhiiv=opp_33b28cd7-77f8-4880-b967-3e2a65e75524_b942af4d&bhcl_id=59d9bbe8-c0ed-4145-9e07-a20bc040dceb_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">HubSpot&#39;s guide to AI</a> can elevate both your productivity and creativity to get more things done.</p><p class="paragraph" style="text-align:left;">Learn to automate tasks, enhance decision-making, and foster innovation with the power of AI.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://offers.hubspot.com/using-chatgpt-at-work?utm_medium=email-media-newsletter&utm_source={{publication_alphanumeric_id}}&utm_campaign=creator&utm_content=beehiiv&utm_term=version-c&_bhiiv=opp_33b28cd7-77f8-4880-b967-3e2a65e75524_b942af4d&bhcl_id=59d9bbe8-c0ed-4145-9e07-a20bc040dceb_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Download the free guide</a></p><hr class="content_break"><h3 class="heading" style="text-align:left;" id="like-what-youre-reading"><b>Like What You&#39;re Reading?</b></h3><p class="paragraph" style="text-align:left;">Don’t miss a newsletter! <a class="link" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=72-tiktok-s-new-cover-story" target="_blank" rel="noopener noreferrer nofollow">Subscribe</a> to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=72-tiktok-s-new-cover-story"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><h2 class="heading" style="text-align:left;" id="lets-make-sure-my-emails-land-strai">Continue Reading</h2><div class="embed"><a class="embed__url" href="https://spies-lies-cybercrime.ericoneill.net/p/a-tale-of-two-spies?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=72-tiktok-s-new-cover-story" target="_blank"><div class="embed__content"><p class="embed__title"> When I asked Robert Hanssen what he thought of Aldrich Ames, his answer told me more about Hanssen than I was ready to hear. Plus TikTok update and tip to protect your phone. </p></div><img class="embed__image embed__image--right" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/c71f0b7a-3e52-4fb7-8f38-e277b1883c2f/Title_71.png?t=1769275893"/></a></div><div class="embed"><a class="embed__url" href="https://spies-lies-cybercrime.ericoneill.net/p/phillippe?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=72-tiktok-s-new-cover-story" target="_blank"><div class="embed__content"><p class="embed__title"> A former spy and Ryan Phillippe explore acting, espionage, improv, and deception in a one-hour, subscriber-only conversation on trust in the AI age. </p></div><img class="embed__image embed__image--right" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/8dba382b-209a-4cbb-9cec-2b10e0fe1c8d/Ryan_Title_Image.png?t=1768234226"/></a></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=ca054f02-c756-4482-a9a8-3c053292a700&utm_medium=post_rss&utm_source=spies_lies_cybercrime">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>71: A Tale of Two Spies</title>
  <description>Spies, Lies &amp; Cybercrime by Eric O&#39;Neill</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/c71f0b7a-3e52-4fb7-8f38-e277b1883c2f/Title_71.png" length="861320" type="image/png"/>
  <link>https://spies-lies-cybercrime.ericoneill.net/p/a-tale-of-two-spies</link>
  <guid isPermaLink="true">https://spies-lies-cybercrime.ericoneill.net/p/a-tale-of-two-spies</guid>
  <pubDate>Tue, 27 Jan 2026 14:03:23 +0000</pubDate>
  <atom:published>2026-01-27T14:03:23Z</atom:published>
    <dc:creator>Eric ONeill</dc:creator>
    <category><![CDATA[Cybersecurity]]></category>
    <category><![CDATA[Espionage]]></category>
    <category><![CDATA[Spying]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b><a class="link" href="#title-story" rel="noopener noreferrer nofollow">Title Story: </a></b>Two spies betrayed America from opposite sides of the intelligence world—and when I asked Robert Hanssen what he thought of Aldrich Ames, his answer told me more about Hanssen than I was ready to hear.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#cybersecurity-tip-of-the-week" rel="noopener noreferrer nofollow">Cybersecurity Tip of the Week: </a></b>Your phone is a digital treasure chest, and cybercriminals are increasingly breaking into cloud accounts to steal private content and extort victims.</p><p class="paragraph" style="text-align:left;"><a class="link" href="#technology-news-of-the-week" rel="noopener noreferrer nofollow"><b>Technology News of the Week: </b></a>TikTok’s “American deal” may solve the easy problem (data storage), but the real question is whether China still controls what the algorithm shows you.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#appearance-of-the-week" rel="noopener noreferrer nofollow">Appearance of the Week:</a></b><a class="link" href="#appearance-of-the-week" rel="noopener noreferrer nofollow"> </a>I joined Forcepoint’s To the Point podcast to break down the real limits of AI in cybersecurity—and why human judgment, verification, and creativity still matter as threats evolve faster than automation can keep up.</p></div><h1 class="heading" style="text-align:left;" id="title-story">Title Story</h1><h2 class="heading" style="text-align:left;" id="a-tale-of-two-spies">A Tale of Two Spies</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/c71f0b7a-3e52-4fb7-8f38-e277b1883c2f/Title_71.png?t=1769275835"/></div><p class="paragraph" style="text-align:left;">Aldrich Ames died in prison this month, ending the life of a man who helped inflict one of the most catastrophic intelligence collapses in American history. A CIA counterintelligence officer with deep access to sensitive operations, Ames sold U.S. secrets to the Soviets for years—names, methods, sources, and ongoing operations—while living far beyond his means and daring his agency to notice. In 1994, he was arrested, convicted, and sentenced to life without parole. He never saw freedom again. He died behind bars, exactly where a traitor belongs.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6b900a60-3737-47df-807f-1234559d1def/Ames_Arrest.png?t=1769275947"/><div class="image__source"><span class="image__source_text"><p>Aldrich Hazen Ames was arrested by the FBI in Arlington, Virginia on espionage charges on February 21, 1994.</p></span></div></div><p class="paragraph" style="text-align:left;">Ames didn’t work alone in destroying national security. While Ames was gutting the CIA from the inside, Robert Hanssen was doing the same to the FBI. These two men—each betraying the nation in parallel, each unknown to the other—contributed to the loss of nearly every American asset inside the Soviet Union in 1984 and 1985, the height of the Cold War. Hanssen’s espionage went beyond selling secrets; he helped cripple America’s ability to catch spies at all. He exposed nuclear warfare secrets, continuity-of-government plans, identities of U.S. sources in Russia, compromised undercover operations and operatives, and most devastatingly, corroded the FBI’s counterintelligence capacity from the inside out. Ames blew holes in our intelligence. Hanssen helped teach the enemy exactly where to aim.</p><p class="paragraph" style="text-align:left;">And here’s the part that still sticks with me: <b>Hanssen didn’t respect Ames. Not even a little.</b></p><h4 class="heading" style="text-align:left;" id="a-targeted-question-for-an-afternoo">A Targeted Question for an Afternoon Stroll. </h4><p class="paragraph" style="text-align:left;">I had many conversations with Robert Hanssen. Some were professional: the overt work we both did to analyze and redesign cybersecurity for the FBI. Others were covert: careful questions phrased to sound harmless, designed to earn his trust while quietly searching for the smoking gun in the most sensitive counterintelligence investigation in the Bureau’s history. And some conversations were simply what happens when two men are locked in a secure room for eight to ten hours a day, trying to stay human.</p><p class="paragraph" style="text-align:left;">One conversation fell into all three categories.</p><p class="paragraph" style="text-align:left;">Hanssen was a devout Catholic and a committed member of Opus Dei. He went to Mass daily. Most mornings, he attended early services at his parish near his home in Vienna, Virginia. But on days he ran late—family chaos, oversleeping, or any of the reasons we use to justify missing what matters—he headed instead to the noon Mass at the Catholic Information Center, only a few blocks from FBI Headquarters.</p><p class="paragraph" style="text-align:left;">To build trust with him, I went along.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/8c67a48f-4ebd-435d-b895-9cd09ce96178/breach-movie-ryan-phillippe-chris-cooper.jpg.jpg?t=1769276232"/><div class="image__source"><span class="image__source_text"><p>Eric and Hanssen attending church as depicted in Universal Picture’s Breach (2007).</p></span></div></div><p class="paragraph" style="text-align:left;">I’d bundle up against the January cold and walk beside him through downtown Washington. Those short trips became some of my most operationally useful moments with Hanssen. When you’re walking shoulder to shoulder, outside a secure room, people tend to talk more freely. Especially people who love to hear themselves talk.</p><p class="paragraph" style="text-align:left;">One Wednesday, as we stepped off FBIHQ and turned from 9th Street toward the wide lanes of Pennsylvania Avenue, I took a risk—one of those questions that straddled the line between casual conversation and undercover probing.</p><p class="paragraph" style="text-align:left;">“Hey, boss,” I said as we paused at the curb, waiting for the signal. “What do you think of Aldrich Ames?”</p><p class="paragraph" style="text-align:left;">The question wasn’t out of bounds. Ames had eviscerated American security from inside the CIA, and Hanssen knew more about Russian espionage than anyone I’d ever met. Of course he’d have an opinion. Ames was his closest contemporary in the pantheon of American traitors.</p><p class="paragraph" style="text-align:left;">Hanssen stopped and stared at me.</p><p class="paragraph" style="text-align:left;">For a moment, I thought I’d pushed too far—tripped the wire between suspicion and paranoia that everyone in special operations learns to respect. Then his mouth curled into a thin, sarcastic smile.</p><p class="paragraph" style="text-align:left;">“Ames,” he scoffed. “Aldrich Ames was a moron. A reprobate. A drunk. A loser.”</p><p class="paragraph" style="text-align:left;">The walk signal flashed. We moved into the crosswalk, cutting across 9th Street toward Pennsylvania.</p><p class="paragraph" style="text-align:left;">“Ames couldn’t stop putting drugs up his nose,” Hanssen continued. “No operational security. Spendthrift. The man couldn’t resist buying whatever he and his wife wanted.”</p><p class="paragraph" style="text-align:left;">“Is that how he was caught?” I asked, even though I already knew.</p><p class="paragraph" style="text-align:left;">Of course I knew. I joined the FBI as the Ames investigation was concluding. I’d worked around the agents who chased him, along with fellow spies Earl Pitts and Jim Nicholson.</p><p class="paragraph" style="text-align:left;">But I never let Hanssen see the depth of my <i>counterintelligence</i> background. As far as he knew, I was a <i>counterterrorism</i> specialist—useful, smart, but out of my depth—helping him build counterintelligence into FBI cybersecurity. The mentor-mentee dynamic was effective. Hanssen liked being the expert in the room. And when he felt like the expert, he talked.</p><p class="paragraph" style="text-align:left;">Including, apparently, trash-talking Aldrich Ames.</p><p class="paragraph" style="text-align:left;">“They eventually caught Ames because he was sloppy,” Hanssen said, shaking his head. “But they should’ve caught him far earlier.”</p><p class="paragraph" style="text-align:left;">His shoulder bumped into mine. I braced and pushed back. He did that constantly—drifting into me as we walked, sometimes steering me into walls. I still don’t know if it was his gimpy left leg, a deliberate power move, or just something he found amusing.</p><p class="paragraph" style="text-align:left;">Whatever the reason, he never apologized. Not once.</p><p class="paragraph" style="text-align:left;">“Did you know Ames passed every polygraph they gave him?” Hanssen said, eyebrows raised. “Fooled the examiners—even showing up drunk, with a house paid for in cash, a Jaguar paid for in cash, fur coats for his wife…”</p><p class="paragraph" style="text-align:left;">He scoffed.</p><p class="paragraph" style="text-align:left;">“And they wonder why we find all the spies in the CIA.”</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/3740da14-ba0b-4ab3-844b-b224706861f7/ames_quote.png?t=1769279046"/></div><p class="paragraph" style="text-align:left;">“So you don’t think much of Ames?” I asked, unable to resist. “I mean… he was the most damaging spy in U.S. history.”</p><p class="paragraph" style="text-align:left;">Hanssen stopped short and turned on me.</p><p class="paragraph" style="text-align:left;">His face hardened—so rigid it looked carved from stone.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/8a4d88de-749c-4ecf-8a99-821f416428dd/Screenshot_2026-01-24_at_12.18.24_PM.png?t=1769279081"/></div><p class="paragraph" style="text-align:left;">“Aldrich Ames was a failure in every way,” he said. “He let greed and pride drive his basest instincts. A coward. A failure.”</p><p class="paragraph" style="text-align:left;">Then he jabbed a finger into my chest.</p><p class="paragraph" style="text-align:left;">“Do you know what he said when the CIA finally called in the FBI and the joint task force investigated him?”</p><p class="paragraph" style="text-align:left;">I stepped back slightly, reclaiming space, and met his eyes—my boss, my mentor, and the man I would soon learn was America’s most devastating spy.</p><p class="paragraph" style="text-align:left;">“What did he say?”</p><p class="paragraph" style="text-align:left;">Hanssen lifted his hands and flapped them theatrically, mimicking panic.</p><p class="paragraph" style="text-align:left;">“You’re making a big mistake!” he whined, voice rising into a mock, theatrical pitch. “You must have the wrong man!”</p><p class="paragraph" style="text-align:left;">He dropped his hands and sneered.</p><p class="paragraph" style="text-align:left;">“Coward to the last.”</p><p class="paragraph" style="text-align:left;">Then the mask slid back into place. The familiar cold gaze. The exhaustion underneath.</p><p class="paragraph" style="text-align:left;">“Let’s go,” he said. “We’re going to be late.”</p><p class="paragraph" style="text-align:left;">I remembered that conversation the moment I heard Hanssen had been arrested—and what he said when FBI agents closed in on him near his home on Talisman Lane.</p><p class="paragraph" style="text-align:left;">Given what he thought of Ames, I’ve always wondered whether Hanssen rehearsed his own arrest—whether he planned his words the way other men plan their last prayer.</p><p class="paragraph" style="text-align:left;">I don’t have to wonder.</p><p class="paragraph" style="text-align:left;">After all the time I spent with him, I knew his narcissism wouldn’t allow anything less than a carefully staged exit.</p><p class="paragraph" style="text-align:left;">“The guns are not necessary,” he said calmly as agents surrounded him from all angles, weapons drawn.</p><p class="paragraph" style="text-align:left;">And then, with that slight, familiar smirk—the one I’d seen in countless conversations.</p><p class="paragraph" style="text-align:left;">“What took you so long.”</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6da02ef0-4846-42f8-8ba1-d70570fff0a4/Screenshot_2026-01-24_at_12.18.55_PM.png?t=1769279151"/><div class="image__source"><span class="image__source_text"><p>“What took you so long?”</p></span></div></div><hr class="content_break"><h1 class="heading" style="text-align:left;" id="cybersecurity-tip-of-the-week">Cybersecurity Tip of the Week</h1><h2 class="heading" style="text-align:left;" id="your-phone-is-a-goldmine-for-you-an">Your Phone Is a Goldmine (For You… and Attackers)</h2><p class="paragraph" style="text-align:left;">Most people treat their smartphone like a private vault.</p><p class="paragraph" style="text-align:left;">Attackers treat it like a shopping mall with the doors unlocked.</p><p class="paragraph" style="text-align:left;">The biggest cybersecurity risk on your phone is a basic account takeover exploiting weak passwords, reused passwords, no two-factor authentication, and cloud backups that quietly sync your life into a single point of failure.</p><p class="paragraph" style="text-align:left;">Back in 2014, a brute-force style attack helped expose nude photos of dozens of celebrities, and people reportedly sold “sneak peeks” online for Bitcoin. It was sensational and ugly—but it was also a stark warning.</p><p class="paragraph" style="text-align:left;">Fast forward to now: this same playbook has evolved into a booming criminal business model: <b>extortion</b>. Hackers break into poorly protected phones, emails, and cloud accounts, then search for anything embarrassing or valuable: intimate photos, private messages, financial documents, even personal secrets. If they find it, they weaponize it.</p><p class="paragraph" style="text-align:left;">So here’s the play: lock down your accounts. </p><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><ul><li><p class="paragraph" style="text-align:left;">Use two-factor authentication on your Apple ID, Google account, email, and social media</p></li><li><p class="paragraph" style="text-align:left;">Stop reusing passwords (password managers exist for a reason)</p></li><li><p class="paragraph" style="text-align:left;">Review what your phone automatically backs up to the cloud </p></li><li><p class="paragraph" style="text-align:left;">Assume anything you text, DM, or upload can be copied, forwarded, stolen, leaked, or “accidentally” shared</p></li><li><p class="paragraph" style="text-align:left;">Beware sending any sensitive information over text, email or social media DMs</p></li></ul></td><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/f70ed048-5eba-444f-9fc5-acf70f38c29a/nudes.png?t=1769281491"/></div></td></tr></table><p class="paragraph" style="text-align:left;">And the simplest rule of all: <b>NEVER use a smartphone—or any connected device—to take images you wouldn’t want made public. </b>Don’t text them either. You lose control instantly. If you must take them, stick to polaroids.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="are-you-protected">Are you PROTECTED?</h1><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><a class="image__link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=71-a-tale-of-two-spies" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/cf679b75-e7ba-48e6-8759-1ffcc6a132c8/FC3FCF46-2AFD-4E26-BAFF-333B3ED3AE5F.png?t=1764879388"/></a></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:left;">My new hub, PROTECT, is now live at <a class="link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=71-a-tale-of-two-spies" target="_blank" rel="noopener noreferrer nofollow">ericoneill.net/protect</a> and it’s built for anyone who wants to stop cybercriminal scammers cold. <b>And it’s FREE!</b></p><p class="paragraph" style="text-align:left;">If you want the full battle manual, that’s in <a class="link" href="https://ericoneill.net/books?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=71-a-tale-of-two-spies" target="_blank" rel="noopener noreferrer nofollow">Spies, Lies and Cybercrime</a>. If you want to start protecting yourself right now? Begin here</p><p class="paragraph" style="text-align:left;"><i>Praemonitus Praemunitus!</i></p></td></tr></table><hr class="content_break"><h1 class="heading" style="text-align:left;" id="technology-news-of-the-week">Technology News of the Week </h1><h2 class="heading" style="text-align:left;" id="tik-tok-deal-update-and-why-im-not-">TikTok Deal Update (And Why I’m Not Celebrating Yet)</h2><p class="paragraph" style="text-align:left;">TikTok is inching toward a deal that would place its U.S. operations under American ownership—or at least American supervision. The newest developments focus on the easiest national security fix: where U.S. user data is stored. TikTok claims American user data will remain in the U.S., housed in Oracle Cloud, under a privacy and cybersecurity program audited by third-party experts.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/973ff449-2059-47a8-896a-f8b5e656d14d/tiktok.png?t=1769281723"/></div><p class="paragraph" style="text-align:left;">That’s the good news.</p><p class="paragraph" style="text-align:left;"><b>But here’s my concern: </b>data storage was never the hardest part of the TikTok problem. The real issue has always been the algorithm.</p><p class="paragraph" style="text-align:left;">TikTok’s recommendation engine is the reason the app is so addictive, so effective, and so powerful. Critics (including me) argue it pushes harmful content, especially to teenagers and kids. And from a national security standpoint, the fear isn’t just “China might see your data.” The fear is China could influence what Americans see—shaping narratives, suppressing stories, or amplifying propaganda and disinformation.</p><p class="paragraph" style="text-align:left;">The 2024 law prohibits ByteDance “cooperation” with the U.S. TikTok entity on operating the algorithm. So the biggest question is simple:</p><p class="paragraph" style="text-align:left;">Does the U.S. entity truly own and control the algorithm—or is it still dependent on ByteDance through licensing or coordination?</p><p class="paragraph" style="text-align:left;">If ByteDance still has a hand on the steering wheel—even indirectly—then we haven’t removed the national security risk. We’ve just repackaged it.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="get-the-book-spies-lies-and-cybercr">Get the Book: Spies, Lies, and Cybercrime</h1><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/3ad871ea-372e-4a24-8ce1-1f393a2f0ee7/14DDF795-0201-4AEE-8C2A-A825A38F5266.jpg?t=1760735371"/></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:left;">If you haven’t already, please buy <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=71-a-tale-of-two-spies" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">SPIES, LIES, AND CYBERCRIME</a></span>. If you already have, thank you, and please consider gifting some to friends and colleagues. It’s the perfect gift for tech enthusiasts, entrepreneurs, elders, teenagers, and everyone in between. </p><p class="paragraph" style="text-align:left;">📖 Support my local bookstore. Get a <span style="text-decoration:underline;"><a class="link" href="https://www.kensingtonrowbookshop.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=71-a-tale-of-two-spies" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Signed copy</a></span></p></td></tr></table><p class="paragraph" style="text-align:left;"><b>Please</b> Leave a 5-star review on <span style="text-decoration:underline;"><a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=71-a-tale-of-two-spies" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Amazon</a></span> or on <span style="text-decoration:underline;"><a class="link" href="https://www.goodreads.com/book/show/228909676-spies-lies-and-cybercrime?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=71-a-tale-of-two-spies" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Goodreads</a></span>.</p><p class="paragraph" style="text-align:left;">🎤  I’m on the road doing speaking events. If your company or organization is interested in bringing me to a stage in 2026, <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/contact/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=71-a-tale-of-two-spies" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">book me to speak at your next event</a></span>.</p><p class="paragraph" style="text-align:left;"><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">If you’ve ever paused at an email, login alert, or message and thought, </span><i>“Could this happen to me?”</i><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">—my </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(12, 74, 110)">Linkedin Learning course</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;"> is for you! Login and start learning </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(12, 74, 110)">here</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">.</span></p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="appearance-of-the-week">Appearance of the Week</h1><p class="paragraph" style="text-align:left;">I joined<a class="link" href="https://www.forcepoint.com/resources/podcasts?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=71-a-tale-of-two-spies" target="_blank" rel="noopener noreferrer nofollow"> Forcepoint’s </a><a class="link" href="https://www.forcepoint.com/resources/podcasts?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=71-a-tale-of-two-spies" target="_blank" rel="noopener noreferrer nofollow"><b>To the Point Podcast</b></a><b> </b>to explore the limits of AI in cybersecurity, including why human judgment, verification, and creativity remain critical even as automation accelerates. Through real investigations, clear metaphors, and practical examples, this discussion helps security leaders understand how to prepare for threats that never stop evolving.</p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/288sNV2DbIs" width="100%"></iframe><p class="paragraph" style="text-align:left;">Please support my sponsor. It only takes a click. No purchase necessary!</p><h3 class="heading" style="text-align:left;" id="but-what-can-you-actually-do-about-">But what can you actually DO about the proclaimed ‘AI bubble’? Billionaires know an alternative…</h3><div class="image"><a class="image__link" href="https://www.masterworks.com/?utm_source=beehiiv&utm_medium=newsletter&utm_campaign={{publication_alphanumeric_id}}_{{publication_name_param}}&utm_content=+ai_bubble_25&utm_term=10-25&_bhiiv=opp_0132f4e7-3f02-46c7-8bf8-b0926e823095_79cffd0e&bhcl_id=720b91b7-58ef-4faa-87e2-8d7ebbb3a418_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/503bd98c-8003-4a56-9735-f8daea632927/asdf1.gif?t=1765410709"/></a></div><p class="paragraph" style="text-align:left;">Sure, if you held your stocks since the dotcom bubble, you would’ve been up—eventually. But three years after the dot-com bust the S&P 500 was still far down from its peak. So, how else can you invest when almost every market is tied to stocks?</p><p class="paragraph" style="text-align:left;">Lo and behold, billionaires have an alternative way to diversify: allocate to a physical asset class that outpaced the S&P by 15% from 1995 to 2025, with almost no correlation to equities. It’s part of a massive global market, long leveraged by the ultra-wealthy (Bezos, Gates, Rockefellers etc).</p><p class="paragraph" style="text-align:left;">Contemporary and post-war art.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.masterworks.com/?utm_source=beehiiv&utm_medium=newsletter&utm_campaign={{publication_alphanumeric_id}}_{{publication_name_param}}&utm_content=+ai_bubble_25&utm_term=10-25&_bhiiv=opp_0132f4e7-3f02-46c7-8bf8-b0926e823095_79cffd0e&bhcl_id=720b91b7-58ef-4faa-87e2-8d7ebbb3a418_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Masterworks</a> lets you invest in multimillion-dollar artworks featuring legends like Banksy, Basquiat, and Picasso—without needing millions. Over 70,000 members have together invested more than $1.2 billion across over 500 artworks. So far, 25 sales have delivered net annualized returns like 14.6%, 17.6%, and 17.8%.*</p><p class="paragraph" style="text-align:left;">Want access?</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.masterworks.com/?utm_source=beehiiv&utm_medium=newsletter&utm_campaign={{publication_alphanumeric_id}}_{{publication_name_param}}&utm_content=+ai_bubble_25&utm_term=10-25&_bhiiv=opp_0132f4e7-3f02-46c7-8bf8-b0926e823095_79cffd0e&bhcl_id=720b91b7-58ef-4faa-87e2-8d7ebbb3a418_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">[Click here to skip the waitlist →]</a></p><p class="paragraph" style="text-align:left;"><sub>Investing involves risk. Past performance not indicative of future returns. Reg A disclosures at </sub><sub><a class="link" href="https://masterworks.com/cd?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=71-a-tale-of-two-spies" target="_blank" rel="noopener noreferrer nofollow">masterworks.com/cd</a></sub></p><p class="paragraph" style="text-align:left;"></p><hr class="content_break"><h3 class="heading" style="text-align:left;" id="like-what-youre-reading"><b>Like What You&#39;re Reading?</b></h3><p class="paragraph" style="text-align:left;">Don’t miss a newsletter! <a class="link" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=71-a-tale-of-two-spies" target="_blank" rel="noopener noreferrer nofollow">Subscribe</a> to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=71-a-tale-of-two-spies"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><h3 class="heading" style="text-align:left;" id="continue-reading">Continue Reading</h3><div class="embed"><a class="embed__url" href="https://spies-lies-cybercrime.ericoneill.net/p/phillippe?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=71-a-tale-of-two-spies" target="_blank"><div class="embed__content"><p class="embed__title"> 69: A Conversation with Ryan Phillippe </p><p class="embed__description"> Spies, Lies & Cybercrime by Eric O&#39;Neill - A former spy and Ryan Phillippe explore acting, espionage, improv, and deception in a one-hour, subscriber-only conversation on trust in the AI age. </p><p class="embed__link"> spies-lies-cybercrime.ericoneill.net/p/phillippe </p></div><img class="embed__image embed__image--right" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/8dba382b-209a-4cbb-9cec-2b10e0fe1c8d/Ryan_Title_Image.png?t=1768234226"/></a></div><div class="embed"><a class="embed__url" href="https://spies-lies-cybercrime.ericoneill.net/p/the-shape-of-2026?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=71-a-tale-of-two-spies" target="_blank"><div class="embed__content"><p class="embed__title"> 68: Spies, Lies, and the Shape of 2026 </p><p class="embed__description"> Spies, Lies & Cybercrime by Eric O&#39;Neill - a look forward at espionage, technology and cybercrime predictions for 2026. Plus an analysis of the raid on Venezuela. </p><p class="embed__link"> spies-lies-cybercrime.ericoneill.net/p/the-shape-of-2026 </p></div><img class="embed__image embed__image--right" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/a4b0918e-0a71-49f0-9bf7-0028ef7a3112/2026.png?t=1767380548"/></a></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=4f0349a7-3fe5-4cf6-aaf1-9c17ea6cc923&utm_medium=post_rss&utm_source=spies_lies_cybercrime">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>70: SOS: When the Phones Went Silent</title>
  <description>Spies, Lies &amp; Cybercrime by Eric O&#39;Neill</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/7144ee70-9305-4a27-99de-73817d818559/title_70.png" length="1281549" type="image/png"/>
  <link>https://spies-lies-cybercrime.ericoneill.net/p/sos-when-the-phones-went-silent</link>
  <guid isPermaLink="true">https://spies-lies-cybercrime.ericoneill.net/p/sos-when-the-phones-went-silent</guid>
  <pubDate>Tue, 20 Jan 2026 14:03:18 +0000</pubDate>
  <atom:published>2026-01-20T14:03:18Z</atom:published>
    <dc:creator>Eric ONeill</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b><a class="link" href="#title-story" rel="noopener noreferrer nofollow">Title Story: </a></b>Verizon’s outage wasn’t just an inconvenience—it was a warning about how quickly life falls apart when communication goes dark.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#cybersecurity-tip-of-the-week" rel="noopener noreferrer nofollow">Cybersecurity Tip of the Week: </a></b>Today’s teens aren’t just being recruited for summer jobs—they’re being recruited for cybercrime. If a “remote gig” pays in crypto and asks for secrecy, it’s not employment. It’s a trap.</p><p class="paragraph" style="text-align:left;"><a class="link" href="#technology-tip-of-the-week" rel="noopener noreferrer nofollow"><b>Technology Tip of the Week: </b></a>Encrypted texting is improving, but the green bubble vs. blue bubble divide still leaves your messages more exposed than you think.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#appearance-of-the-week" rel="noopener noreferrer nofollow">Appearance of the Week:</a></b><b><a class="link" href="#appearance-of-the-week" rel="noopener noreferrer nofollow"> </a></b>I join Major Garrett on CBS News “The Takeout” to discuss the amazing growth of cybercrime. Please watch and leave me a friendly comment on YouTube!</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#ai-trend-of-the-week" rel="noopener noreferrer nofollow">AI Trend Of the Week</a></b><b>:</b> The mini-3D figurine trend is here, and yes—you can now turn yourself into a pocket-sized spy legend in seconds.</p></div><h1 class="heading" style="text-align:left;" id="title-story">Title Story</h1><h2 class="heading" style="text-align:left;" id="sos-when-the-phones-went-silent">SOS: When the Phones Went Silent</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/7144ee70-9305-4a27-99de-73817d818559/title_70.png?t=1768839052"/></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">I was sitting alone in a dark high school parking lot when I realized how fragile modern life has become.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Earlier that day, my teenage son told me his wrestling team’s bus was supposed to return from an away meet at 7:30 PM. Parenting logistics aren’t glamorous, but they’re usually predictable.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Then many phones stopped working. My phone flashed the same warning millions of Americans saw: “SOS.”</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">It felt like we’d been dropped into a world where communication isn’t assumed. I drove to the school anyway to find the gym closed and the parking lot dark and quiet.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">At first, I wasn’t worried. The bus was probably running late. In todays’ world of hyperconnectivity, we expect that order will be restored in a heartbeat. But as the minutes passed, the silence took shape in my mind. Did the bus break down? Was he stranded somewhere without a way to reach me?</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Years ago, I worked in FBI counterterrorism and counterintelligence, sitting quietly in cars in dark places, watching and waiting. Back then, isolation was part of the job. Picking up my son, shouldn’t feel like that. Nor should it remind me how people lived before we attached ourselves to a digital tether.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">In the 1980s and 90s, you made a plan, picked a meeting place, and hoped everyone followed through. If someone didn’t show, you waited. If they still didn’t show, you were left with nothing but guesses. Life worked because people planned ahead and accepted that communication could fail.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">At some point we stopped planning, because we stopped imagining failure.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Three hours after I arrived, headlights finally cut through the darkness. The wrestling bus rolled in. My son stepped off looking exhausted but fine. The meet ran long. The bus had problems. And once the outage started, he had no way to get the message out.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">The disruption was tied to Verizon, which left customers around the country unable to place calls or send texts, pushing phones into SOS mode for hours. Verizon later said it was caused by a software glitch, not a cyberattack, and has provided $20 credits to the two million impacted users. I suspect that explanation will reassure plenty of people. Americans like clean categories.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">But when your phone cannot connect, the cause is secondary. A technical failure isolates people just as effectively as an attack. From the perspective of a parent waiting in the dark with no way to reach their child, the difference is academic.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">And if a glitch can cut millions of people off from one another in a single evening, it’s worth asking how quickly that vulnerability could become deliberate.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">In much of the world, it already is.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">While Americans complained about dropped service, citizens in Iran were living through a different kind of blackout. The Iranian government has repeatedly restricted internet access during unrest, cutting communication so people can’t organize and the outside world can’t see the government’s murderous response.</span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/286f60bc-fe61-4c4c-b662-8b728ba9d892/IranProtests_DB_01122026_A.jpg?t=1768839422"/><div class="image__source"><span class="image__source_text"><p>Iranians gather while blocking a street during a protest in Tehran, Iran on January 9, 2026</p></span></div></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Authoritarian regimes know that repression by silence can be just as effective as shooting protestors in the street. Without communication, protest becomes harder, rescue becomes difficult, and accountability becomes elusive.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">For years, one of the few technologies believed capable of punching through that darkness was Starlink, a satellite internet system tied to the idea of censorship-proof connectivity. It promised that a government couldn’t simply flip a switch and cut a nation off, because the connection would come from the sky.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Iran exposed the cracks in that promise. Reports suggest that Iran used Russian technology to disrupt Starlink access by targeting Starlink’s dependence on GPS signals. By interfering with GPS, Iran could degrade or block connectivity in key areas. Starlink responded with updates designed to keep service functioning, but the episode revealed something sobering: the contest over information is an evolving struggle.</span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/0399e28d-aeae-4051-aa9f-97b781eb13f6/Screenshot_2026-01-19_at_11.21.15_AM.png?t=1768839690"/><div class="image__source"><span class="image__source_text"><p>SpaceX has waived the Starlink subscription fee in Iran.</p></span></div></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">When citizens find new ways to communicate, regimes find new ways to silence them. The battlefield shifts from streets to frequencies, from bullets to bandwidth, but the logic is unchanged: control the message, control the population.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">That might sound far away from an American phone outage. But the lesson isn’t. Connectivity is now a pillar of safety and freedom. When communication fails, people become vulnerable. When it’s taken away on purpose, control moves quickly to whoever holds the switch.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">What can you do?</span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/11d508c5-01ea-420b-990d-15b827e009f6/meetup.png?t=1768839973"/><div class="image__source"><span class="image__source_text"><p>Start with a family plan.</p></span></div></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Start with the simplest step: make a family plan that works without cell service.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Pick a meetup location ahead of time. Somewhere obvious and easy to reach. Agree on what happens if someone can’t be reached by a certain hour. Choose one out-of-state family member everyone can try to contact if local networks are down. And make sure kids know the plan before the next disruption happens.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Because the next time phones flash SOS, you don’t want to improvise.</span></p><hr class="content_break"><p class="paragraph" style="text-align:center;">Please subscribe and tell a friend</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://spies-lies-cybercrime.ericoneill.net/subscribe?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=70-sos-when-the-phones-went-silent"><span class="button__text" style=""> Subscribe for more Intel </span></a></div><hr class="content_break"><h1 class="heading" style="text-align:left;" id="cybersecurity-tip-of-the-week">Cybersecurity Tip of the Week</h1><h2 class="heading" style="text-align:left;" id="the-job-offer-thats-actually-a-rans">“The Job Offer” That’s Actually a Ransomware Trap</h2><p class="paragraph" style="text-align:left;">At first glance, the posts look harmless: fast money, flexible hours, paid training, no experience required. Payment in crypto. Easy work. Easy wins.</p><p class="paragraph" style="text-align:left;">But these aren’t tutoring gigs or customer service jobs.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/92206cd0-47a3-4cc5-b502-b7e7e7e58824/teen_recruitment.png?t=1768841011"/></div><p class="paragraph" style="text-align:left;">They’re recruitment ads for ransomware crews and online extortion rings—and many of the people answering them are middle and high school students. Some recruiters even prefer inexperienced teens because they’re easier to control, harder to trace back to the “real” criminals, and willing to do the riskiest tasks: phone calls, impersonation, phishing scripts, and social engineering.</p><p class="paragraph" style="text-align:left;">The damage can be huge. Victims lose money, companies get shut down, and real people lose access to services. But for teens, the consequences can be even more personal: federal charges, prison time, a permanent record, and a future that gets wrecked before it even starts.</p><p class="paragraph" style="text-align:left;">These groups operate through loose, shifting networks often referred to as “The Com” (short for “The Community”). The pitch is always the same: “It’s just work.” The truth is simpler: it’s crime with onboarding.</p><p class="paragraph" style="text-align:left;">Here are 5 steps parents and teens can use to spot the trap before it’s too late:</p><ol start="1"><li><p class="paragraph" style="text-align:left;"><b>Follow the money: </b>If the “job” pays only in crypto, that’s a strong clue that the payor wants to conceal their identity.</p></li><li><p class="paragraph" style="text-align:left;"><b>Check the recruiting channel:</b> Real companies don’t hire through Discord DMs, Telegram, gaming chats, or Snapchat messages.</p></li><li><p class="paragraph" style="text-align:left;"><b>Listen for secrecy: </b>If they say, “Don’t tell your parents,” “Don’t tell your school,” or “Keep this quiet,” they are manipulating you.</p></li><li><p class="paragraph" style="text-align:left;"><b>Look for impersonation requests: </b>If the “work” involves pretending to be IT support, calling employees, resetting passwords, or “testing access,” you’ve just joined an extortion pipeline.</p></li><li><p class="paragraph" style="text-align:left;"><b>Slow it down and verify: </b>Search the company. Call the public number. Confirm the recruiter’s identity. If it can’t be verified outside the chat, it isn’t real.</p></li></ol><p class="paragraph" style="text-align:left;">Bottom line: Teens with tech skills have real opportunities. But talent doesn’t protect you from consequences. The fastest money usually comes with the longest sentence.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="are-you-protected">Are you PROTECTED?</h1><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><a class="image__link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=70-sos-when-the-phones-went-silent" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/cf679b75-e7ba-48e6-8759-1ffcc6a132c8/FC3FCF46-2AFD-4E26-BAFF-333B3ED3AE5F.png?t=1764879388"/></a></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:left;">My new hub, PROTECT, is now live at <a class="link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=70-sos-when-the-phones-went-silent" target="_blank" rel="noopener noreferrer nofollow">ericoneill.net/protect</a> and it’s built for anyone who wants to stop cybercriminal scammers cold. <b>And it’s FREE!</b></p><p class="paragraph" style="text-align:left;">If you want the full battle manual, that’s in <a class="link" href="https://ericoneill.net/books?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=70-sos-when-the-phones-went-silent" target="_blank" rel="noopener noreferrer nofollow">Spies, Lies and Cybercrime</a>. If you want to start protecting yourself right now? Begin here</p><p class="paragraph" style="text-align:left;"><i>Praemonitus Praemunitus!</i></p></td></tr></table><hr class="content_break"><h1 class="heading" style="text-align:left;" id="technology-tip-of-the-week">Technology Tip of the Week </h1><h2 class="heading" style="text-align:left;" id="is-it-safe-to-text-again-not-yet-bu">Is It Safe to Text Again? Not Yet, But Maybe Soon.</h2><p class="paragraph" style="text-align:left;">About a year ago, the FBI warned Americans to stop relying on ordinary text messages because Chinese hackers were intercepting communications across U.S. mobile networks. That warning still holds. Traditional SMS can be captured in transit, and even newer cross-platform texting (like RCS) still has a security problem: it isn’t end-to-end encrypted by default when iPhone users text Android users (the blue bubble/green bubble problem).</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/c9965a61-ccf7-4d84-b79f-c320b5adc0f0/green_bubble.png?t=1768841435"/></div><p class="paragraph" style="text-align:left;">The U.S. government’s advice has been blunt: if you want private communication, use end-to-end encrypted messaging apps such as Signal or WhatsApp, especially for anything sensitive.</p><p class="paragraph" style="text-align:left;">Apple has also cautioned users that RCS messages are not end-to-end encrypted, meaning a third party could potentially read them while they move between devices. </p><p class="paragraph" style="text-align:left;">And let’s be honest: people treat the blue bubble like a trust badge and the green bubble like a restraining order. Unfortunately, from a security standpoint, both bubbles can still leak when you cross platforms.</p><p class="paragraph" style="text-align:left;">The good news is that a fix may finally be coming. <a class="link" href="https://www.forbes.com/sites/zakdoffman/2026/01/13/stop-texting-on-your-iphone-what-now-after-fbi-warning/?utm_source=flipboard&utm_content=forbes/magazine/cybersecurity" target="_blank" rel="noopener noreferrer nofollow">Reports suggest Apple has added encryption-related carrier settings in an iOS 26.3 beta</a>, which could pave the way for fully encrypted cross-platform RCS messaging. But no carriers have enabled it yet.</p><p class="paragraph" style="text-align:left;">Bottom line: Until true cross-platform encryption goes live, treat SMS and RCS like postcards: fine for logistics, terrible for secrets.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="get-the-book-spies-lies-and-cybercr">Get the Book: Spies, Lies, and Cybercrime</h1><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/3ad871ea-372e-4a24-8ce1-1f393a2f0ee7/14DDF795-0201-4AEE-8C2A-A825A38F5266.jpg?t=1760735371"/></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:left;">If you haven’t already, please buy <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=70-sos-when-the-phones-went-silent" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">SPIES, LIES, AND CYBERCRIME</a></span>. If you already have, thank you, and please consider gifting some to friends and colleagues. It’s the perfect gift for tech enthusiasts, entrepreneurs, elders, teenagers, and everyone in between. </p><p class="paragraph" style="text-align:left;">📖 Support my local bookstore. Get a <span style="text-decoration:underline;"><a class="link" href="https://www.kensingtonrowbookshop.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=70-sos-when-the-phones-went-silent" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Signed copy</a></span></p></td></tr></table><p class="paragraph" style="text-align:left;"><b>Please</b> Leave a 5-star review on <span style="text-decoration:underline;"><a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=70-sos-when-the-phones-went-silent" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Amazon</a></span> or on <span style="text-decoration:underline;"><a class="link" href="https://www.goodreads.com/book/show/228909676-spies-lies-and-cybercrime?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=70-sos-when-the-phones-went-silent" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Goodreads</a></span>.</p><p class="paragraph" style="text-align:left;">🎤  I’m on the road doing speaking events. If your company or organization is interested in bringing me to a stage in 2026, <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/contact/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=70-sos-when-the-phones-went-silent" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">book me to speak at your next event</a></span>.</p><p class="paragraph" style="text-align:left;"><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">If you’ve ever paused at an email, login alert, or message and thought, </span><i>“Could this happen to me?”</i><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">—my </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(12, 74, 110)">Linkedin Learning course</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;"> is for you! Login and start learning </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(12, 74, 110)">here</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">.</span></p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="appearance-of-the-week">Appearance of the Week</h1><p class="paragraph" style="text-align:left;">In his new book &quot;Spies, Lies, and Cybercrime,&quot; former FBI Counterintelligence Operative Eric O&#39;Neill describes the art of outsmarting cybercriminals and protecting your data and wallet. O&#39;Neill spoke with CBS News&#39; Major Garrett about steps people can take to stay safe online. <b>Please watch and leave me a friendly comment on YouTube to let me know you were there.</b></p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/QVjUOJcVsbI" width="100%"></iframe><hr class="content_break"><h1 class="heading" style="text-align:left;" id="ai-trend-of-the-week"><b>AI Trend of the Week</b></h1><p class="paragraph" style="text-align:left;">If you’ve ever wanted to see yourself as a tiny, plastic legend standing confidently on a desk… congratulations. AI has officially made that possible. The Mini-Figure trend is blowing up—and it’s way more fun than it has any right to be.</p><table width="100%" class="bh__column_wrapper"><tr><td width="40%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/0961993e-a75e-46b7-bc38-de79b546763d/240430_1562.jpeg?t=1735703641"/><div class="image__source"><span class="image__source_text"><p>original.</p></span></div></div></td><td width="60%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/b39a2b76-05e4-4a44-b795-088bd4ff0a10/eric_spy.png?t=1768842054"/><div class="image__source"><span class="image__source_text"><p>mini figure me.</p></span></div></div></td></tr></table><h3 class="heading" style="text-align:left;" id="steal-this-mini-3-d-figure-prompt-c">Steal this Mini 3D Figure Prompt (Copy/Paste Template)</h3><p class="paragraph" style="text-align:left;">Make a miniature, full-body, isometric, realistic 3D figurine of <b>[PERSON / UPLOAD PHOTO OR DESCRIPTION]</b>, wearing <b>[OUTFIT / CLOTHING DETAILS]</b>, doing <b>[ACTION / POSE]</b>, holding <b>[PROPS / OBJECTS]</b>, standing on <b>[BASE / PLATFORM STYLE]</b>, with <b>[EXTRA DETAILS / ACCESSORIES]</b>. White background, minimal, studio lighting, soft shadow, ultra-detailed, 4K resolution.</p><p class="paragraph" style="text-align:left;"><b>Optional style add-ons:</b></p><ul><li><p class="paragraph" style="text-align:left;">Material: <b>[vinyl / resin / plastic / clay]</b></p></li><li><p class="paragraph" style="text-align:left;">Mood: <b>[serious / playful / heroic / cute]</b></p></li><li><p class="paragraph" style="text-align:left;">Theme: <b>[spy / cyber / sports / holiday / business]</b></p></li><li><p class="paragraph" style="text-align:left;">Color palette: <b>[neutral / neon / retro / monochrome]</b></p></li></ul><hr class="content_break"><p class="paragraph" style="text-align:left;">Please support our advertisers. It only takes a click!</p><h3 class="heading" style="text-align:left;" id="the-future-of-tech-one-daily-news-b">The Future of Tech. One Daily News Briefing. </h3><div class="image"><a class="image__link" href="https://www.forwardfuture.ai/join/?utm_campaign=f6c178f4-9377-48e4-90be-1db85ee83517&utm_term={{publication_alphanumeric_id}}&utm_source=beehiiv&_bhiiv=opp_a12cccee-e1aa-4d78-a81a-ef32d0c7685a_47ee8611&bhcl_id=c7ca6508-62ca-4ac8-b01a-ea3d2cecd0c2_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/dcd0badf-c4c0-4c36-8f71-15e67ec7e532/Frame_1244831159.png?t=1768433345"/></a></div><p class="paragraph" style="text-align:left;">AI is moving faster than any other technology cycle in history. New models. New tools. New claims. New noise.</p><p class="paragraph" style="text-align:left;">Most people feel like they’re behind. But the people that don’t, aren’t smarter. They’re just better informed.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.forwardfuture.ai/join/?utm_campaign=f6c178f4-9377-48e4-90be-1db85ee83517&utm_term={{publication_alphanumeric_id}}&utm_source=beehiiv&_bhiiv=opp_a12cccee-e1aa-4d78-a81a-ef32d0c7685a_47ee8611&bhcl_id=c7ca6508-62ca-4ac8-b01a-ea3d2cecd0c2_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Forward Future</a> is a daily news briefing for people who want clarity, not hype. In one concise newsletter each day, you’ll get the most important AI and tech developments, learn why they matter, and what they signal about what’s coming next. </p><p class="paragraph" style="text-align:left;">We cover real product launches, model updates, policy shifts, and industry moves shaping how AI actually gets built, adopted, and regulated. Written for operators, builders, leaders, and anyone who wants to sound sharp when AI comes up in the meeting.</p><p class="paragraph" style="text-align:left;">It takes about five minutes to read, but the edge lasts all day.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.forwardfuture.ai/join/?utm_campaign=f6c178f4-9377-48e4-90be-1db85ee83517&utm_term={{publication_alphanumeric_id}}&utm_source=beehiiv&_bhiiv=opp_a12cccee-e1aa-4d78-a81a-ef32d0c7685a_47ee8611&bhcl_id=c7ca6508-62ca-4ac8-b01a-ea3d2cecd0c2_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Sign Up. Look Smart.</a></p><p class="paragraph" style="text-align:left;"></p><hr class="content_break"><h3 class="heading" style="text-align:left;" id="like-what-youre-reading"><b>Like What You&#39;re Reading?</b></h3><p class="paragraph" style="text-align:left;">Don’t miss a newsletter! <a class="link" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=70-sos-when-the-phones-went-silent" target="_blank" rel="noopener noreferrer nofollow">Subscribe</a> to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=70-sos-when-the-phones-went-silent"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><h1 class="heading" style="text-align:left;" id="lets-make-sure-my-emails-land-strai">Keep reading</h1><div class="embed"><a class="embed__url" href="https://spies-lies-cybercrime.ericoneill.net/p/phillippe?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=70-sos-when-the-phones-went-silent" target="_blank"><div class="embed__content"><p class="embed__title"> 69: A Conversation with Ryan Phillippe </p><p class="embed__description"> Spies, Lies & Cybercrime by Eric O&#39;Neill - A former spy and Ryan Phillippe explore acting, espionage, improv, and deception in a one-hour, subscriber-only conversation on trust in the AI age. </p><p class="embed__link"> spies-lies-cybercrime.ericoneill.net/p/phillippe </p></div><img class="embed__image embed__image--right" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/8dba382b-209a-4cbb-9cec-2b10e0fe1c8d/Ryan_Title_Image.png?t=1768234226"/></a></div><div class="embed"><a class="embed__url" href="https://spies-lies-cybercrime.ericoneill.net/p/the-shape-of-2026?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=70-sos-when-the-phones-went-silent" target="_blank"><div class="embed__content"><p class="embed__title"> 68: Spies, Lies, and the Shape of 2026 </p><p class="embed__description"> Spies, Lies & Cybercrime by Eric O&#39;Neill - a look forward at espionage, technology and cybercrime predictions for 2026. Plus an analysis of the raid on Venezuela. </p><p class="embed__link"> spies-lies-cybercrime.ericoneill.net/p/the-shape-of-2026 </p></div><img class="embed__image embed__image--right" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/a4b0918e-0a71-49f0-9bf7-0028ef7a3112/2026.png?t=1767380548"/></a></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=da27a01f-2971-4581-af8c-7b86ef606bd2&utm_medium=post_rss&utm_source=spies_lies_cybercrime">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>69: A Conversation with Ryan Phillippe</title>
  <description>Spies, Lies &amp; Cybercrime by Eric O&#39;Neill</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/8dba382b-209a-4cbb-9cec-2b10e0fe1c8d/Ryan_Title_Image.png" length="1452993" type="image/png"/>
  <link>https://spies-lies-cybercrime.ericoneill.net/p/phillippe</link>
  <guid isPermaLink="true">https://spies-lies-cybercrime.ericoneill.net/p/phillippe</guid>
  <pubDate>Tue, 13 Jan 2026 14:03:20 +0000</pubDate>
  <atom:published>2026-01-13T14:03:20Z</atom:published>
    <dc:creator>Eric ONeill</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><h1 class="heading" style="text-align:left;" id="a-note-from-eric">A note from Eric</h1><p class="paragraph" style="text-align:left;">This conversation has been twenty years in the making. Ryan Phillippe and I first met in 2005, on the set of Breach, when he was preparing to play me in the story of how we exposed one of the most damaging spies in FBI history. What started as an awkward Hollywood dinner turned into a long friendship—and, eventually, this conversation about identity, deception, and what it costs to live inside another life. We talk acting, espionage, AI-driven deception, and why trust may be the rarest commodity left. This is not an interview. It’s a conversation.</p><h1 class="heading" style="text-align:left;" id="red-carpets-red-flags">Red Carpets & Red Flags</h1><h2 class="heading" style="text-align:left;" id="ryan-phillippe-on-playing-a-spy-bec"><span style="font-family:Helvetica;font-size:13.5pt;"><b>Ryan Phillippe on Playing a Spy, Becoming Someone Else, and Why Deception Is the Most Dangerous Skill of the Modern Age</b></span></h2><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/il-T_z-d7jk" width="100%"></iframe><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">When Ryan Phillippe and I finally sat down for what we agreed to call a </span><span style="font-family:Helvetica;"><i>conversation</i></span><span style="font-family:Helvetica;"> (not an interview) it felt a lot like two guys comparing notes from parallel lives. That’s probably inevitable when one of you has spent years pretending to be someone else for a living, and the other did it because national security demanded it.</span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/3310d9f1-7e3e-4011-ad86-c23057de18d2/Screenshot_2025-10-21_at_5.03.17_PM.png?t=1768157496"/><div class="image__source"><span class="image__source_text"><p>Relaxing in Delaware</p></span></div></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">We first met on November 8, 2005, at a production dinner for </span><span style="font-family:Helvetica;"><a class="link" href="https://www.imdb.com/title/tt0401997/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=69-a-conversation-with-ryan-phillippe" target="_blank" rel="noopener noreferrer nofollow"><i>Breach</i></a></span><span style="font-family:Helvetica;">, the film about one of the most catastrophic betrayals in FBI history. Phillippe had been cast to play me—an undercover operative tasked with exposing Robert Hanssen, a trusted insider who sold America’s secrets to the Russians. It was an unusual dynamic from the start. Actors rarely portray living people close in age, let alone ones sitting a few seats away, quietly wondering how Hollywood plans to compress years of paranoia, tradecraft, and personal sacrifice into two hours.</span></p><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/2fcae79b-6738-4b49-9bac-edfbb6a2ce45/IMG_7069.JPG?t=1768157710"/><div class="image__source"><span class="image__source_text"><p>Ryan and Eric on the set of Breach.</p></span></div></div></td><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/a8a9d556-19ef-4095-b20e-0ced4cbd2767/Screenshot_2025-12-11_at_11.44.31_AM.png?t=1768157636"/><div class="image__source"><span class="image__source_text"><p>Ryan on the set of breach with Chris Cooper and Billy Ray.</p></span></div></div></td></tr></table><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">That night, we sat on opposite sides of the dinner table. Then, later, out for drinks in Toronto, our first conversation began. We talked about how strange it is to watch someone prepare to </span><span style="font-family:Helvetica;"><i>be</i></span><span style="font-family:Helvetica;"> you—and how strange it is to prepare to </span><span style="font-family:Helvetica;"><i>be</i></span><span style="font-family:Helvetica;"> someone whose life actually happened. Somewhere between stories, we realized we shared roots on the Eastern Shore, grandfathers who fought in the pacific, engineer fathers, devoted mothers, and the fact that we had probably sat yards away from each other on the same beach as children. The ice broke. What started as an awkward casting obligation turned into a friendship that’s now spanned nearly two decades.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">What struck me most during our recent conversation wasn’t nostalgia—it was how naturally espionage and acting kept colliding.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Phillippe talked about building characters the way serious actors do: backstories, motivations, private details no one else sees. I told him that in the intelligence world, we call that a </span><span style="font-family:Helvetica;"><i>legend</i></span><span style="font-family:Helvetica;">. A fully fabricated identity, complete with documents, habits, memories, and emotional texture. You don’t “pretend” to be that person. You </span><span style="font-family:Helvetica;"><i>become</i></span><span style="font-family:Helvetica;"> them. Because the moment you don’t believe it, the person across from you won’t either.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><b>Actors call that method acting. Intelligence officers call it survival.</b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Neither profession runs on scripts. Phillippe described how the most honest moments on screen often happen between the lines—small, unscripted reactions that make a scene feel real. That made me think. Undercover work is almost entirely improvisation. You plan relentlessly, then abandon the plan the second reality intervenes. Improv classes are a lot like this. You learn to read the room, anticipate behavior, adapt instantly. Surveillance works the same way: memorizing patterns, predicting movements, blending in so completely you become invisible. Different stakes. Same skills.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><b>Then there’s the cost.</b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Phillippe spoke candidly about how certain roles followed him home—and how becoming a father forced a reckoning. You can’t live inside darkness forever without bringing some of it back with you. I understood that immediately. Undercover work fractures your life by design. You lie to everyone who loves you. You compartmentalize until it becomes muscle memory. </span><span style="font-family:Helvetica;"><i>Breach</i></span><span style="font-family:Helvetica;"> didn’t shy away from showing what that secrecy did to my marriage, and for good reason. Living two lives, whether for art or country, comes with a psychological bill that arrives late, and collects interest.</span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/2099d75c-e3c7-4328-9368-97b29b619a26/Ryan.jpg?t=1768158089"/><div class="image__source"><span class="image__source_text"><p>Ryan. Photography by John Russo.</p></span></div></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><b>Our conversation didn’t stay in the past.</b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">We shifted to the present moment, where deception has gone industrial. Phillippe talked about how criminals now use AI to clone his voice and image to scam fans—weaponizing trust at scale. Deepfakes. Synthetic speech. Entirely fabricated realities moving faster than truth can keep up. I warned that we’re entering an era where “seeing is believing” is dead, and authentication—not charisma—is the new currency. Weak passwords don’t stand a chance. Two-factor authentication isn’t optional. The same techniques once reserved for intelligence operations are now available to anyone with a laptop and bad intentions.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Espionage has gone mainstream. Acting has gone synthetic. The overlap is no longer theoretical.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><b>We ended where we probably had to: responsibility.</b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Phillippe doesn’t take lightly the act of portraying real people. There’s a duty to accuracy, to humanity, to the families who live with the consequences long after the credits roll. I admitted that watching </span><span style="font-family:Helvetica;"><i>Breach</i></span><span style="font-family:Helvetica;"> for the first time was both one of the most amazing and strange moments of my life. You take a risk when a Hollywood studio dramatizes your life. But I also recognized the value. Stories, told honestly, can educate people about threats they’d rather not imagine. </span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/8dba382b-209a-4cbb-9cec-2b10e0fe1c8d/Ryan_Title_Image.png?t=1768233785"/></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">So could a Hollywood actor be a spy? Absolutely. Could a former spy survive in Hollywood? Maybe.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">What’s undeniable is this: both worlds demand the same core skill—the ability to understand human behavior, to inhabit other perspectives, and to know when something doesn’t feel right. In an age of AI-driven deception and collapsing trust, those instincts aren’t just useful. They’re essential.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">And maybe that’s the real takeaway from this conversation—not that our professions overlapped, but that the line between performance and reality has never been thinner.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">~ Eric</span></p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://spies-lies-cybercrime.ericoneill.net/subscribe?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=69-a-conversation-with-ryan-phillippe"><span class="button__text" style=""> Become a Spy Hunter </span></a></div><hr class="content_break"><h1 class="heading" style="text-align:left;" id="get-the-book-spies-lies-and-cybercr">Get the Book: Spies, Lies, and Cybercrime</h1><p class="paragraph" style="text-align:left;">If you haven’t already, please buy <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=69-a-conversation-with-ryan-phillippe" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">SPIES, LIES, AND CYBERCRIME</a></span>. If you already have, thank you, and please consider gifting some to friends and colleagues. It’s the perfect holiday gift and stocking stuffer! </p><p class="paragraph" style="text-align:left;"><b>Please</b> Leave a 5-star review on <span style="text-decoration:underline;"><a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=69-a-conversation-with-ryan-phillippe" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Amazon</a></span> or on <span style="text-decoration:underline;"><a class="link" href="https://www.goodreads.com/book/show/228909676-spies-lies-and-cybercrime?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=69-a-conversation-with-ryan-phillippe" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Goodreads</a></span>.</p><p class="paragraph" style="text-align:left;">📖 Support a local bookstore. Get a <span style="text-decoration:underline;"><a class="link" href="https://www.kensingtonrowbookshop.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=69-a-conversation-with-ryan-phillippe" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Signed copy</a></span></p><p class="paragraph" style="text-align:left;">🎤  I’m on the road doing speaking events. If your company or organization is interested in bringing me to a stage in 2026, <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/contact/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=69-a-conversation-with-ryan-phillippe" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">book me to speak at your next event</a></span>.</p><p class="paragraph" style="text-align:left;"><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">If you’ve ever paused at an email, login alert, or message and thought, </span><i>“Could this happen to me?”</i><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">—my </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(12, 74, 110)">Linkedin Learning course</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;"> is for you! Login and start learning </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(12, 74, 110)">here</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">My new hub, PROTECT, is now live at </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=69-a-conversation-with-ryan-phillippe" target="_blank" rel="noopener noreferrer nofollow">ericoneill.net/protect</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;"> and it’s built for anyone who wants to stop cybercriminal scammers cold.</span></p><hr class="content_break"><p class="paragraph" style="text-align:left;">Don’t miss a newsletter! <a class="link" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=69-a-conversation-with-ryan-phillippe" target="_blank" rel="noopener noreferrer nofollow">Subscribe</a> to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=69-a-conversation-with-ryan-phillippe"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><hr class="content_break"><p class="paragraph" style="text-align:left;">Support our partners so that I can bring you this newsletter completely free! It only takes a click. No purchase necessary.</p><h3 class="heading" style="text-align:left;" id="stop-planning-start-building">Stop Planning. Start Building.</h3><div class="image"><a class="image__link" href="http://www.beehiiv.com/splash?utm_medium=cpc&utm_source=beehiiv_ad_network&utm_content=V2&utm_source_platform=newsletter&utm_campaign=Q42025-Dec-{{publication_alphanumeric_id}}-{{publication_name_param}}&utm_term=CPC&_bhiiv=opp_3c1935d2-a2b2-42fe-973b-ff9983933c91_ebb56c0d&bhcl_id=f99311c9-6693-44c4-831c-26b143c48396_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/9df609ba-a4de-4d2e-b936-a9651bcc76a3/decimg2.png?t=1765900371"/></a></div><p class="paragraph" style="text-align:left;">End of the year? Or time to start something new. </p><p class="paragraph" style="text-align:left;">With <a class="link" href="http://www.beehiiv.com/splash?utm_medium=cpc&utm_source=beehiiv_ad_network&utm_content=V2&utm_source_platform=newsletter&utm_campaign=Q42025-Dec-{{publication_alphanumeric_id}}-{{publication_name_param}}&utm_term=CPC&_bhiiv=opp_3c1935d2-a2b2-42fe-973b-ff9983933c91_ebb56c0d&bhcl_id=f99311c9-6693-44c4-831c-26b143c48396_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">beehiiv</a>, this quiet stretch of time can become your biggest advantage. Their platform gives you all the tools you need to make real progress, real fast. </p><p class="paragraph" style="text-align:left;">In just days (or even minutes) you can:</p><ul><li><p class="paragraph" style="text-align:left;">Build a fully-functioning website with the AI website builder </p></li><li><p class="paragraph" style="text-align:left;">Launch a professional-looking newsletter</p></li><li><p class="paragraph" style="text-align:left;">Earn money on autopilot with the beehiiv ad network</p></li><li><p class="paragraph" style="text-align:left;">Host all of your content on one easy-to-use platform</p></li></ul><p class="paragraph" style="text-align:left;">If you’re looking to have a breakthrough year, beehiiv is the place to start. And to help motivate you even more, we’re giving you 30% off for three months with code BIG30.</p><p class="paragraph" style="text-align:left;"><a class="link" href="http://www.beehiiv.com/splash?utm_medium=cpc&utm_source=beehiiv_ad_network&utm_content=V2&utm_source_platform=newsletter&utm_campaign=Q42025-Dec-{{publication_alphanumeric_id}}-{{publication_name_param}}&utm_term=CPC&_bhiiv=opp_3c1935d2-a2b2-42fe-973b-ff9983933c91_ebb56c0d&bhcl_id=f99311c9-6693-44c4-831c-26b143c48396_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Start building for 30% off today</a></p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p><hr class="content_break"><p class="paragraph" style="text-align:left;">Continue reading with a look forward to 2026:</p><div class="embed"><a class="embed__url" href="https://spies-lies-cybercrime.ericoneill.net/p/the-shape-of-2026?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=69-a-conversation-with-ryan-phillippe" target="_blank"><div class="embed__content"><p class="embed__title"> 68: Spies, Lies, and the Shape of 2026 </p><p class="embed__description"> Spies, Lies & Cybercrime by Eric O&#39;Neill - a look forward at espionage, technology and cybercrime predictions for 2026. Plus an analysis of the raid on Venezuela. </p><p class="embed__link"> spies-lies-cybercrime.ericoneill.net/p/the-shape-of-2026 </p></div><img class="embed__image embed__image--right" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/a4b0918e-0a71-49f0-9bf7-0028ef7a3112/2026.png?t=1767380548"/></a></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=a967abcb-e6a3-40f0-8bc1-6a15af80d56b&utm_medium=post_rss&utm_source=spies_lies_cybercrime">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>68: Spies, Lies, and the Shape of 2026</title>
  <description>Spies, Lies &amp; Cybercrime by Eric O&#39;Neill</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/a4b0918e-0a71-49f0-9bf7-0028ef7a3112/2026.png" length="1270800" type="image/png"/>
  <link>https://spies-lies-cybercrime.ericoneill.net/p/the-shape-of-2026</link>
  <guid isPermaLink="true">https://spies-lies-cybercrime.ericoneill.net/p/the-shape-of-2026</guid>
  <pubDate>Tue, 06 Jan 2026 14:03:19 +0000</pubDate>
  <atom:published>2026-01-06T14:03:19Z</atom:published>
    <dc:creator>Eric ONeill</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">A quick note before we get to the title story and predictions for this year. Most of us woke up from vacation wondering whether the story of a just after midnight raid on Venezuela was a deepfake. It wasn&#39;t. Instead, we witnessed one of the most incredible espionage operations in history. <br><br>Operation <b>Absolute Resolve</b> reads less like today’s headlines and more like vintage Tom Clancy or Brad Thor—Jack Ryan or Scot Harvath stepping off the page and into real life—but this was no fiction. At its core was exquisite CIA tradecraft: a months-long pattern-of-life operation on Nicolás Maduro and his wife, built patiently through HUMINT, trusted sources inside the regime, drone surveillance, and other classified techniques that, for obvious reasons, don’t make it into press briefings. This is the work I once did domestically with the FBI to catch spies and terrorists, and it’s reassuring to see that the fundamentals—human intelligence, persistence, discipline—still matter. </p><p class="paragraph" style="text-align:left;">Strip away the spectacle and the operation was almost absurd in its purity: an immense U.S. military escort—more than 150 aircraft from 20 regional bases—so FBI agents could serve an arrest warrant on an indicted narco-terrorist. Incredible in scope, but precise in execution. </p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/e7fae2b1-2f21-4c0b-85a3-a71e91bce875/Screenshot_2026-01-05_at_10.34.58_AM.png?t=1767627308"/><div class="image__source"><span class="image__source_text"><p>Fire at Fuerte Tiuna, Venezuela&#39;s largest military complex.</p></span></div></div><p class="paragraph" style="text-align:left;">And then there’s the detail few are discussing: the not-so-subtle hint dropped in a Trump press conference that the lights going out in Caracas may not have been accidental, but the result of a sophisticated U.S. cyber infiltration ahead of the first bombing run. If true, it quietly demonstrates something I’ve argued for years—that the best way to deter China, Russia, Iran, and North Korea from launching a coordinated cyberattack on U.S. critical infrastructure is to prove, unmistakably, that we can hit back just as hard. Mutual assured cyber destruction. That message likely landed hard in Beijing and Moscow, and that’s not a bad thing. </p><p class="paragraph" style="text-align:left;">The legal, political, and geopolitical fallout will be debated for months—was it lawful, should Congress have been notified, was this war or policing, does it spark chaos or open the door for democracy and the return of eight million displaced Venezuelans? All of that matters. But one truth stands apart: spies still change history. They undermine regimes, depose dictators, and win wars long before the shooting starts. Let’s hope our spies stay very, very good at it.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/7d9a59ce-d5e4-4031-b564-9fa3b4a64bac/Screenshot_2026-01-05_at_10.33.48_AM.png?t=1767627245"/><div class="image__source"><span class="image__source_text"><p>Maduro after his arrest and exfiltration to the United States.</p></span></div></div><p class="paragraph" style="text-align:left;">Now on to this week’s story!</p><h1 class="heading" style="text-align:left;" id="title-story">Title Story</h1><h1 class="heading" style="text-align:left;" id="spies-lies-and-the-shape-of-2026">Spies, Lies, and the Shape of 2026</h1><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/a4b0918e-0a71-49f0-9bf7-0028ef7a3112/2026.png?t=1767380442"/></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">The board meeting ended early.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">A video had surfaced overnight—grainy but convincing—showing a CEO saying something she never said, agreeing to something she never agreed to, in a tone only her closest colleagues would recognize. To the company’s horror, the video leaked and made the national news. The legal team watched it twice. HR watched it once. The board didn’t finish the first viewing before the decision was made.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Within 48 hours, the CEO resigned.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Weeks later, forensic experts proved the video was a deepfake. Every frame synthetic. Every word fabricated. The company never corrected the record. It didn’t need to. The damage had already landed.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">That’s the world 2026 is sprinting toward—not because technology is evil, but because </span><span style="font-family:Helvetica;"><b>trust has become fragile, fast, and exploitable</b></span><span style="font-family:Helvetica;">. To make the world safe from a new age of deception and deepfakes, we will need to evolve.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Here’s what I believe is coming next, but reply to this email or comments about what concerns you into the future and what you are excited about in the world of technology. Who knows, your idea or concerns could become my next newsletter!</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">And stay tuned for next week’s issue! I’ll be posting the full interview with actor, director, producer, entrepreneur and my friend Ryan Phillippe! You will have to be subscribed to see it. So check bye box below and make certain you’ve dropped me your email. </span></p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://spies-lies-cybercrime.ericoneill.net/subscribe?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=68-spies-lies-and-the-shape-of-2026"><span class="button__text" style=""> Join the Spy Hunters </span></a></div><h1 class="heading" style="text-align:left;" id="the-bad-news"><span style="font-family:Helvetica;">The Bad News</span></h1><h3 class="heading" style="text-align:left;" id="1-deepfake-blackmail-reaches-the-bo">1. Deepfake Blackmail Reaches the Boardroom</h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><i>The first major corporate takedown will be powered entirely by fake evidence.</i></span></p><table width="100%" class="bh__column_wrapper"><tr><td width="70%" class="bh__column"><p class="paragraph" style="text-align:justify;"><span style="font-family:Helvetica;">AI-generated audio and video will be convincing enough to force resignations, tank stock prices, and trigger regulatory scrutiny. Investigations will eventually reveal the truth, but truth will move too slowly to matter. In 2026, viral perception, magnified by social media and the 24-hour news cycle will outrun proof every time. Now imagine this scenario used as deepfake opposition research against a political opponent. Worried yet?</span></p></td><td width="30%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/11e74715-9770-40ce-bfa8-c5e7fd75ee6a/image_1.png?t=1767382712"/><div class="image__source"><span class="image__source_text"><p>Deepfakes</p></span></div></div></td></tr></table><h3 class="heading" style="text-align:left;" id="2-critical-infrastructure-attacks-g">2. Critical Infrastructure Attacks Go Quiet</h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><i>The most dangerous cyberattacks won’t look like attacks at all.</i></span></p><table width="100%" class="bh__column_wrapper"><tr><td width="70%" class="bh__column"><p class="paragraph" style="text-align:justify;"><span style="font-family:Helvetica;">One of the major things that keeps me up at night is fear of a catastrophic power grid critical infrastructure attack. But attacks in the new year may be more nefarious. Instead of blackouts or explosions, systems will simply underperform: water pressure drops, hospital systems lag, shipping delays compound. Everything will still “work,” just badly enough to erode confidence. Attribution will be nearly impossible, and that will be by design.</span></p></td><td width="30%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/ca7bdf32-fbeb-48c8-a0b8-d1bf808351c6/2.png?t=1767382795"/><div class="image__source"><span class="image__source_text"><p>Sabotage</p></span></div></div></td></tr></table><h3 class="heading" style="text-align:left;" id="3-ransomware-becomes-customer-frien">3. Ransomware Becomes Customer-Friendly</h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><i>Cybercriminals will discover what legitimate businesses already know: good customer service closes deals.</i></span></p><table width="100%" class="bh__column_wrapper"><tr><td width="70%" class="bh__column"><p class="paragraph" style="text-align:justify;"><span style="font-family:Helvetica;">Ransomware has been a scourge across the globe for decades with an innovation race between cybercrime and cybersecurity. To earn more profit, Cybercrime syndicates will innovate like legitimate businesses. Ransomware groups will offer live chat, payment plans, and polite negotiation. Victims will pay faster when criminals feel organized and predictable. Cybercrime will model the mafia and will look less chaotic and more professional.</span></p></td><td width="30%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/b7c39d84-0ffe-4a24-a21c-41aa164cceb4/3.png?t=1767382844"/><div class="image__source"><span class="image__source_text"><p>Ransomware</p></span></div></div></td></tr></table><h3 class="heading" style="text-align:left;" id="4-your-digital-twin-commits-a-crime">4. Your Digital Twin Commits a Crime</h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><i>Someone will act as you—and you’ll have the burden of proof!</i></span></p><table width="100%" class="bh__column_wrapper"><tr><td width="70%" class="bh__column"><p class="paragraph" style="text-align:justify;"><span style="font-family:Helvetica;">AI is already replicating voices, writing styles, and decision-making patterns with disturbing accuracy. It is even threatening to replace actors and AI avatar social media accounts have enormous followings. Now image cybercriminals that use AI to become you. Contracts will be signed, instructions issued, and funds moved without the need for physical access. Courts and insurers will struggle to answer a once-unthinkable question: was it you or your doppelgänger. </span></p></td><td width="30%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/bbfda4d7-6ca5-471b-bb3e-5b035e01272e/4.png?t=1767382866"/><div class="image__source"><span class="image__source_text"><p>Doppelgänger</p></span></div></div></td></tr></table><h3 class="heading" style="text-align:left;" id="5-cybercrime-and-organized-crime-fu">5. Cybercrime and Organized Crime Fully Merge</h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><i>The keyboard will officially outperform the gun.</i></span></p><table width="100%" class="bh__column_wrapper"><tr><td width="70%" class="bh__column"><p class="paragraph" style="text-align:justify;"><span style="font-family:Helvetica;">Drug cartels, trafficking networks, and traditional crime syndicates will move toward cybercrime as their primary revenue engine. Digital fraud will fund real-world violence. Law enforcement will be forced to chase both malware and kinetic crime at the same time. We have already seen this begin with cryptojacking, a crime where the victim is stalked online for having large cryptocurrency accounts and then kidnapped physically to coerce them into providing the keys.  </span></p></td><td width="30%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/e0ad5e55-7cac-455b-8fef-b9dd96accd2b/5.png?t=1767382965"/><div class="image__source"><span class="image__source_text"><p>Organized Crime</p></span></div></div></td></tr></table><h1 class="heading" style="text-align:left;" id="the-good-news"><span style="font-family:Helvetica;"><b>The Good News</b></span></h1><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">As criminals evolve in 2026 to scam us, cybersecurity will continue to race against them. The next five predictions hint at a brighter future where we make things harder for the bad guys.     </span></p><h3 class="heading" style="text-align:left;" id="6-deepfake-detection-becomes-mandat">6. Deepfake Detection Becomes Mandatory</h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><i>“Prove it’s really you” will become a daily requirement.</i></span></p><table width="100%" class="bh__column_wrapper"><tr><td width="70%" class="bh__column"><p class="paragraph" style="text-align:justify;"><span style="font-family:Helvetica;">Banks, courts, employers, and government agencies will deploy real-time voice and video authentication. It will feel inconvenient and intrusive—until people realize the alternative is institutional collapse. Verification will become part of civic infrastructure. We will install apps on our phones and devices that identify deepfakes and provide intelligence into all our communications.</span></p></td><td width="30%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/2bffc867-7135-4a9e-ad8a-3f67b9cd0501/6.png?t=1767382975"/><div class="image__source"><span class="image__source_text"><p>Detectors</p></span></div></div></td></tr></table><h3 class="heading" style="text-align:left;" id="7-critical-systems-go-analog-on-pur">7. Critical Systems Go Analog—On Purpose</h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><i>The future of resilience will look suspiciously old-school.</i></span></p><table width="100%" class="bh__column_wrapper"><tr><td width="70%" class="bh__column"><p class="paragraph" style="text-align:justify;"><span style="font-family:Helvetica;">Many companies are already returning to tape backups to preserve data in a format that cybercriminals and spies cannot access digitally. Manual overrides, air gaps, and human checkpoints will return to essential systems. Some things are safest when they cannot be reached remotely.</span></p></td><td width="30%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/71a71553-be22-45bc-9e3d-01f1d7c510f0/8.png?t=1767383013"/><div class="image__source"><span class="image__source_text"><p>Analog Defense</p></span></div></div></td></tr></table><h3 class="heading" style="text-align:left;" id="8-insider-threat-programs-finally-g">8. Insider Threat Programs Finally Get Serious</h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><i>The most dangerous attackers will already have credentials.</i></span></p><table width="100%" class="bh__column_wrapper"><tr><td width="70%" class="bh__column"><p class="paragraph" style="text-align:justify;"><span style="font-family:Helvetica;">Organizations will stop treating insider risk as a technical failure and start treating it as a leadership and culture problem. Access will tighten, behavior will be monitored, and trust will be verified continuously. Espionage prevention will become part of the corporate mindset and technology that continuously analyzes data using AI analytics will become mandatory.</span></p></td><td width="30%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/b95fa9e7-254e-4e03-9865-a35d5599b408/9.png?t=1767383040"/><div class="image__source"><span class="image__source_text"><p>Spy Hunting</p></span></div></div></td></tr></table><h3 class="heading" style="text-align:left;" id="9-cybercrime-loses-its-easy-money">9. Cybercrime Loses Its Easy Money</h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><i>Ransomware will stop being a gold rush.</i></span></p><table width="100%" class="bh__column_wrapper"><tr><td width="70%" class="bh__column"><p class="paragraph" style="text-align:justify;"><span style="font-family:Helvetica;">International cooperation will improve, asset seizures will accelerate, and payment channels will narrow. Cybercrime units across the globe will share information and hunt criminals in their own borders. Criminals won’t disappear, but margins will shrink. When cybercrime stops paying well, fewer people choose it.</span></p></td><td width="30%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/8ac771e6-5675-4b2e-86b2-528f1c2a5009/9.png?t=1767383240"/><div class="image__source"><span class="image__source_text"><p>Collaboration</p></span></div></div></td></tr></table><h3 class="heading" style="text-align:left;" id="10-digital-identity-gets-rebuiltand">10. Digital Identity Gets Rebuilt—and the Password Finally Dies</h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><i>We may finally witness the end of the password.</i></span></p><table width="100%" class="bh__column_wrapper"><tr><td width="70%" class="bh__column"><p class="paragraph" style="text-align:justify;"><span style="font-family:Helvetica;">Governments and industry will accelerate the shift toward cryptographic identity, biometrics, hardware-backed authentication, and zero-trust access models. Passwords—long broken, endlessly reused, and trivially stolen—will begin to fade from critical systems. Identity won’t be perfect, but impersonation will become harder, riskier, and more expensive than it has ever been.</span></p></td><td width="30%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/b8b70105-68f6-4f4e-a8b5-97fef1cea8ed/10.png?t=1767383080"/><div class="image__source"><span class="image__source_text"><p>A New You Online</p></span></div></div></td></tr></table><h1 class="heading" style="text-align:left;" id="im-excited-for-2026">I’m Excited for 2026</h1><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">For all the noise and anxiety around what’s coming, here’s the good news: we’re finally waking up.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">2026 won’t be the year deception disappears—but it </span><span style="font-family:Helvetica;"><i>will</i></span><span style="font-family:Helvetica;"> be the year we stop being shocked by it. We’re building better systems, smarter defenses, and healthier habits around a simple truth: trust isn’t granted once anymore; it’s earned every day. That’s progress.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">The people and organizations willing to adapt will do more than survive—they’ll be stronger, harder to fool, and far more resilient than anything that came before. This isn’t the end of trust. It’s the upgrade.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Personally, I’m excited. I’m ready. And I think 2026 has the potential to be a turning point, not a breaking point.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">If you want to start preparing </span><span style="font-family:Helvetica;"><b>now</b></span><span style="font-family:Helvetica;">, not later, that’s exactly why I wrote </span><span style="font-family:Helvetica;"><a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=68-spies-lies-and-the-shape-of-2026" target="_blank" rel="noopener noreferrer nofollow"><i>Spies, Lies, and Cybercrime</i></a></span><span style="font-family:Helvetica;">. It’s a practical guide to how deception actually works—and what you can do today to protect yourself, your family, and your organization before the next headline hits.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">The future is coming either way.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">This time, we don’t have to meet it unprepared.</span></p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="get-the-book-spies-lies-and-cybercr">Get the Book: Spies, Lies, and Cybercrime</h1><p class="paragraph" style="text-align:left;">If you haven’t already, please buy <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=68-spies-lies-and-the-shape-of-2026" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">SPIES, LIES, AND CYBERCRIME</a></span>. If you already have, thank you, and please consider gifting some to friends and colleagues. It’s the perfect holiday gift and stocking stuffer! </p><p class="paragraph" style="text-align:left;"><b>Please</b> Leave a 5-star review on <span style="text-decoration:underline;"><a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=68-spies-lies-and-the-shape-of-2026" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Amazon</a></span> or on <span style="text-decoration:underline;"><a class="link" href="https://www.goodreads.com/book/show/228909676-spies-lies-and-cybercrime?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=68-spies-lies-and-the-shape-of-2026" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Goodreads</a></span>.</p><p class="paragraph" style="text-align:left;">📖 Support a local bookstore. Get a <span style="text-decoration:underline;"><a class="link" href="https://www.kensingtonrowbookshop.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=68-spies-lies-and-the-shape-of-2026" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Signed copy</a></span></p><p class="paragraph" style="text-align:left;">🎤  I’m on the road doing speaking events. If your company or organization is interested in bringing me to a stage in 2026, <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/contact/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=68-spies-lies-and-the-shape-of-2026" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">book me to speak at your next event</a></span>.</p><p class="paragraph" style="text-align:left;"><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">If you’ve ever paused at an email, login alert, or message and thought, </span><i>“Could this happen to me?”</i><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">—my </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(12, 74, 110)">Linkedin Learning course</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;"> is for you! Login and start learning </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(12, 74, 110)">here</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">My new hub, PROTECT, is now live at </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=68-spies-lies-and-the-shape-of-2026" target="_blank" rel="noopener noreferrer nofollow">ericoneill.net/protect</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;"> and it’s built for anyone who wants to stop cybercriminal scammers cold.</span></p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="appearance-of-the-week">Appearance of the Week</h1><p class="paragraph" style="text-align:left;">Stay tuned for NEXT week! A conversation with Actor, Producer and Director Ryan Phillippe, the man that played me in the movie Breach. <b>Subscribe now</b> to ensure you don’t miss the amazing content I’m cooking up for 2026. </p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/e75tUWjByD8" width="100%"></iframe><p class="paragraph" style="text-align:left;">Don’t miss a newsletter! <a class="link" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=68-spies-lies-and-the-shape-of-2026" target="_blank" rel="noopener noreferrer nofollow">Subscribe</a> to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=68-spies-lies-and-the-shape-of-2026"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><hr class="content_break"><p class="paragraph" style="text-align:left;">Support our partners so that I can bring you this newsletter completely free! It only takes a click. No purchase necessary.</p><h3 class="heading" style="text-align:left;">Learn AI in 5 minutes a day</h3><div class="image"><a class="image__link" href="https://magic.beehiiv.com/v1/4d03390d-2481-4299-b949-ffd8b38b4c38?email={{email}}&utm_campaign={{publication_alphanumeric_id}}&redirect_to=https%3A%2F%2Fsubscribe.therundown.ai%2F%3Fform%3Dopen&redirect_delay=1&_gl=1*1qqix25*_gcl_au*MTYwNDc0Mjg2OC4xNzI5NTMyNjYw*_ga*MTk2YzU4MDctZGFlZi00MjQ3LWIzZDYtYTQ1MTUwMmJiZTQ0*_ga_E6Y4WLQ2EC*MTczMjUxMTg2Ny4yNTkzLjEuMTczMjUxMzM4My42MC4wLjE4NTk3NDE3MTE.&_bhiiv=opp_02708439-299c-4882-901f-ae25c8ced29f_e4221c46&bhcl_id=e9913558-7820-4884-b83f-f65110349f2d_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="border-radius:0px 0px 0px 0px;border-style:solid;border-width:0px 0px 0px 0px;box-sizing:border-box;border-color:#E5E7EB;" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/81826e33-9f55-4e89-be2a-d882f2a77bd2/Banner_2.png?t=1732571457"/></a></div><p class="paragraph" style="text-align:left;">This is the easiest way for a busy person wanting to learn AI in as little time as possible: </p><ol start="1"><li><p class="paragraph" style="text-align:left;">Sign up for <a class="link" href="https://magic.beehiiv.com/v1/4d03390d-2481-4299-b949-ffd8b38b4c38?email={{email}}&utm_campaign={{publication_alphanumeric_id}}&redirect_to=https%3A%2F%2Fsubscribe.therundown.ai%2F%3Fform%3Dopen&redirect_delay=1&_gl=1*1qqix25*_gcl_au*MTYwNDc0Mjg2OC4xNzI5NTMyNjYw*_ga*MTk2YzU4MDctZGFlZi00MjQ3LWIzZDYtYTQ1MTUwMmJiZTQ0*_ga_E6Y4WLQ2EC*MTczMjUxMTg2Ny4yNTkzLjEuMTczMjUxMzM4My42MC4wLjE4NTk3NDE3MTE.&_bhiiv=opp_02708439-299c-4882-901f-ae25c8ced29f_e4221c46&bhcl_id=e9913558-7820-4884-b83f-f65110349f2d_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">The Rundown AI</a> newsletter</p></li><li><p class="paragraph" style="text-align:left;">They send you 5-minute email updates on the latest AI news and how to use it</p></li><li><p class="paragraph" style="text-align:left;">You learn how to become 2x more productive by leveraging AI</p></li></ol><p class="paragraph" style="text-align:left;"><a class="link" href="https://magic.beehiiv.com/v1/4d03390d-2481-4299-b949-ffd8b38b4c38?email={{email}}&utm_campaign={{publication_alphanumeric_id}}&redirect_to=https%3A%2F%2Fsubscribe.therundown.ai%2F%3Fform%3Dopen&redirect_delay=1&_gl=1*1qqix25*_gcl_au*MTYwNDc0Mjg2OC4xNzI5NTMyNjYw*_ga*MTk2YzU4MDctZGFlZi00MjQ3LWIzZDYtYTQ1MTUwMmJiZTQ0*_ga_E6Y4WLQ2EC*MTczMjUxMTg2Ny4yNTkzLjEuMTczMjUxMzM4My42MC4wLjE4NTk3NDE3MTE.&_bhiiv=opp_02708439-299c-4882-901f-ae25c8ced29f_e4221c46&bhcl_id=e9913558-7820-4884-b83f-f65110349f2d_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Sign up to start learning.</a></p><hr class="content_break"><p class="paragraph" style="text-align:left;">Continue reading with a look back at 2025:</p><div class="embed"><a class="embed__url" href="https://spies-lies-cybercrime.ericoneill.net/p/year-in-review?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=68-spies-lies-and-the-shape-of-2026" target="_blank"><div class="embed__content"><p class="embed__title"> 2025 Year in Review </p><p class="embed__description"> Spies, Lies & Cybercrime by Eric O&#39;Neill - The 2025 Year in Review of cybercrime, espionage, AI deception, major hacks, and the lessons learned from a year of digital conflict. </p><p class="embed__link"> spies-lies-cybercrime.ericoneill.net/p/year-in-review </p></div><img class="embed__image embed__image--right" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/27e248cd-0f18-450e-b21b-12b439f3bbda/2025_wrapped_title.png?t=1767026590"/></a></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=b2675ac1-435b-4745-ba7c-f929bb6ef026&utm_medium=post_rss&utm_source=spies_lies_cybercrime">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>67: The Year in Review</title>
  <description>Spies, Lies &amp; Cybercrime by Eric O&#39;Neill</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/27e248cd-0f18-450e-b21b-12b439f3bbda/2025_wrapped_title.png" length="738650" type="image/png"/>
  <link>https://spies-lies-cybercrime.ericoneill.net/p/year-in-review</link>
  <guid isPermaLink="true">https://spies-lies-cybercrime.ericoneill.net/p/year-in-review</guid>
  <pubDate>Tue, 30 Dec 2025 14:03:24 +0000</pubDate>
  <atom:published>2025-12-30T14:03:24Z</atom:published>
    <dc:creator>Eric ONeill</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><h1 class="heading" style="text-align:left;" id="happy-new-year">Happy New Year!</h1><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6c49f075-f5ed-4f98-a1d0-eff930e0d08d/2025_wrapped.png?t=1767026554"/></div><h2 class="heading" style="text-align:left;" id="year-in-review-the-10-stories-that-">Year in Review: The 10 Stories That Shaped Our Most Turbulent Year Yet</h2><p class="paragraph" style="text-align:left;">I love wraps. Every year my family sits down together and we compare our Spotify wraps and laugh at each other. These days everyone is doing it, from LinkedIn to Instagram, even Chat GPT got into the mix.</p><p class="paragraph" style="text-align:left;">But, looking back, <span style="font-family:Helvetica;">this year didn’t drift by quietly. Just as I predicted in </span><span style="font-family:Helvetica;"><a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=67-the-year-in-review" target="_blank" rel="noopener noreferrer nofollow">Spies, Lies and Cybercrime</a></span><span style="font-family:Helvetica;"> (the book), 2025 challenged every assumption we hold about digital trust, and forced us to confront the reality that the world of espionage and cyber conflict is no longer confined to classified war rooms. It’s woven into daily life, every device, every app, every infrastructure system we take for granted. 2026 is going to be wild! </span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">As we wrap up the year, here are the ten stories that carried the greatest weight. These are the stories that moved conversations, sharpened understanding, and, in many cases, exposed threats hiding in plain sight.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><b>1. Your Devices Are Listening</b></span></p><div class="embed"><a class="embed__url" href="https://spies-lies-cybercrime.ericoneill.net/p/your-devices-are-listening?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=67-the-year-in-review" target="_blank"><img class="embed__image embed__image--left" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/cc74557c-1b30-457a-9a08-004e19f4262c/title_61.png?t=1763398025"/><div class="embed__content"><p class="embed__title"> 61: Your Devices Are Listening </p><p class="embed__description"> Spies, Lies & Cybercrime by Eric O&#39;Neill - Uncover the truth about device listening, sonic beacons, and digital tracking—plus the essential steps to lock down your privacy. </p><p class="embed__link"> spies-lies-cybercrime.ericoneill.net/p/your-devices-are-listening </p></div></a></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">This story pulled back the curtain on a modern reality most people sense but rarely confront: the microphones around us are always on. Drawing from both intelligence tradecraft and documented patents, whistleblower reporting, and academic research, the piece explained how phones, smart speakers, apps, and even browsers continuously monitor audio streams for wake words, context, and behavioral signals. The reason? To feed algorithms trained to predict, influence, and monetize human behavior. The issue resonated with you because it didn’t rely on paranoia or theatrics; it treated consumer technology the way intelligence professionals treat any listening device: assume collection, minimize exposure, and control the microphone before it controls you.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><b>2. Happy Thanksgiving</b></span></p><div class="embed"><a class="embed__url" href="https://spies-lies-cybercrime.ericoneill.net/p/happy-thanksgiving?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=67-the-year-in-review" target="_blank"><img class="embed__image embed__image--left" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/02558754-5bb0-4072-bb7b-c12cb27e4de5/62_title.png?t=1764001701"/><div class="embed__content"><p class="embed__title"> 62: Happy Thanksgiving </p><p class="embed__description"> Spies, Lies & Cybercrime by Eric O&#39;Neill-Thanksgiving phone-free challenge plus Black Friday scam defense, JLR cyber breach insights, and expert tactics to stay safe from hackers and fraud. </p><p class="embed__link"> spies-lies-cybercrime.ericoneill.net/p/happy-thanksgiving </p></div></a></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">This story marked a deliberate pause in a year dominated by cyber threats and digital noise, while still delivering practical value. Alongside a personal challenge to put phones away and reclaim Thanksgiving as a moment of real human connection, the issue also introduced the launch of my </span><span style="font-family:Helvetica;"><a class="link" href="https://ericoneill.net/protect/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=67-the-year-in-review" target="_blank" rel="noopener noreferrer nofollow">PROTECT page</a></span><span style="font-family:Helvetica;">—a new resource designed to help readers defend themselves and their families from scams, fraud, deepfakes, and account takeovers. Timed for the holiday shopping rush, the newsletter outlined clear, actionable steps to avoid AI imposters, smishing attacks, fake deals, and fraudulent charities, reinforcing that staying present doesn’t mean staying unprepared.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><b>3. China’s Typhoon Attack Groups: The Quiet War That Already Started</b></span></p><div class="embed"><a class="embed__url" href="https://spies-lies-cybercrime.ericoneill.net/p/the-china-trap?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=67-the-year-in-review" target="_blank"><img class="embed__image embed__image--left" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/5545566d-e166-46a3-9ffe-ff16b2226ed8/The_China_Trap.png?t=1757270328"/><div class="embed__content"><p class="embed__title"> 51: The China Trap </p><p class="embed__description"> Spies, Lies & Cybercrime by Eric O&#39;Neill - China’s cyber trap, massive breaches, credit card skimmers, flying cars, and Google AI photo magic—your weekly intel on spies & cybercrime. </p><p class="embed__link"> spies-lies-cybercrime.ericoneill.net/p/the-china-trap </p></div></a></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Our most consequential reporting centered on China’s aggressive cyber posture, led by Volt and Salt Typhoon. These state-backed groups methodically infiltrated U.S. critical infrastructure, not to steal data but to position themselves for potential disruption at a moment of geopolitical friction. Paired with China’s public outing of NSA operatives, the story made clear that we are no longer discussing hypothetical conflict. We are documenting an ongoing campaign that demands national attention and a sober reassessment of what modern deterrence really requires.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><b>4. The TikTok Ban and America’s Fractured Attention</b></span></p><div class="embed"><a class="embed__url" href="https://spies-lies-cybercrime.ericoneill.net/p/19-the-case-against-tiktok?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=67-the-year-in-review" target="_blank"><img class="embed__image embed__image--left" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/995220f1-4e50-43c2-a414-b5df4578e8bb/the_case_against_tiktok_title.png?t=1737401942"/><div class="embed__content"><p class="embed__title"> 19: The Case Against TikTok </p><p class="embed__description"> Spies, Lies and Cybercrime by Eric O&#39;Neill - Explore the TikTok ban: addiction, bipartisan support, pros & cons, national security risks, and why banning the app at home might be the smart move. </p><p class="embed__link"> spies-lies-cybercrime.ericoneill.net/p/19-the-case-against-tiktok </p></div></a></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">The TikTok investigation went beyond alarm over a popular app. It explored how digital addiction reshapes human behavior, how foreign adversaries weaponize that dependence, and why bipartisan leaders finally took aim at a platform designed to extract data and manipulate attention at unprecedented scale. The issue resonated because it bridged personal vulnerability and national security risk, ultimately leading us to the uncomfortable but necessary conclusion that TikTok is a Chinese influence operation.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><b>5. Idiocracy: The Cognitive Cost of an AI-Driven World</b></span></p><div class="embed"><a class="embed__url" href="https://spies-lies-cybercrime.ericoneill.net/p/41-idiocracy-is-ai-making-humans-dumber?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=67-the-year-in-review" target="_blank"><img class="embed__image embed__image--left" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/c34403b4-761c-4cc4-92ea-08e0ae5cb916/Title.png?t=1751139066"/><div class="embed__content"><p class="embed__title"> 41: Idiocracy: Is AI Making Humans Dumber? </p><p class="embed__description"> Is AI making us dumber? Explore shocking MIT findings, QR code hacks, spy drones, and emotional AI dependence in this week’s Spies, Lies & Cybercrime by Eric O&#39;Neill </p><p class="embed__link"> spies-lies-cybercrime.ericoneill.net/p/41-idiocracy-is-ai-making-humans-dumber </p></div></a></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">In examining whether AI is quietly eroding human intelligence, we confronted a truth many sensed but few articulated: reliance breeds complacency. The MIT research revealed measurable drops in brain activity when users let AI systems do the thinking for them, and the broader analysis showed how emotional dependence on AI companions further accelerates mental atrophy. My warning is that our greatest risk may be forgetting how to think critically as machines become more convenient than our own judgment.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><b>6. Trusted Insiders: The Betrayal That Never Goes Out of Style</b></span></p><div class="embed"><a class="embed__url" href="https://spies-lies-cybercrime.ericoneill.net/p/31-how-to-catch-a-mole?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=67-the-year-in-review" target="_blank"><img class="embed__image embed__image--left" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/2f59f1c9-98c5-4491-8c4e-195a2cc250df/title_31.png?t=1744393874"/><div class="embed__content"><p class="embed__title"> 31 - How to Catch a Mole </p><p class="embed__description"> Spies, Lies & Cybercrime by Eric O&#39;Neill - Uncover the chilling reality of trusted insiders, from spies and traitors to rogue employees. How betrayal begins, why it happens, and how to stop the moles among us. </p><p class="embed__link"> spies-lies-cybercrime.ericoneill.net/p/31-how-to-catch-a-mole </p></div></a></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">This year’s insider-threat feature revisited infamous cases (Hanssen, the Toebbes, Gregory Allen Justice, and GhostExodus) to show how betrayal evolves but never disappears. The motivations range from ideology to ego to financial desperation, but the outcome is constant: catastrophic loss delivered by someone who was trusted to guard the vault. The lesson for every organization, from government agencies to private companies, is that insider threats aren’t rare or exceptional, they are predictable, </span><span style="font-family:Helvetica;"><i><b>and preventable</b></i></span><span style="font-family:Helvetica;">, if we remain vigilant.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><b>7. O’Neill’s Four Rules of Surveillance</b></span></p><div class="embed"><a class="embed__url" href="https://spies-lies-cybercrime.ericoneill.net/p/44-o-neill-s-four-rules-of-surveillance?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=67-the-year-in-review" target="_blank"><img class="embed__image embed__image--left" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/5169b3c9-f825-4c19-bb32-1f27eb30e3e1/Four_Rules.png?t=1752849749"/><div class="embed__content"><p class="embed__title"> 44: O&#39;Neill&#39;s Four Rules of Surveillance </p><p class="embed__description"> Master surveillance with 4 proven FBI tradecraft rules—boost awareness, confidence & control in business, life & high-stakes situations - Spies, Lies & Cybercrime by Eric O&#39;Neill </p><p class="embed__link"> spies-lies-cybercrime.ericoneill.net/p/44-o-neill-s-four-rules-of-surveillance </p></div></a></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">This piece distilled years of real undercover experience into four practical principles that readers could apply immediately to their careers and daily lives. The response was overwhelming because the message was simple: awareness is a skill, not a gift. I taught you how to observe with intention, anticipate behavior, and navigate high-pressure environments with the same clarity demanded in counterintelligence. It became one of the defining frameworks of the newsletter: a bridge between spycraft and everyday success.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><b>8. The Great Escape: A Prison Break with a Digital Lesson</b></span></p><div class="embed"><a class="embed__url" href="https://spies-lies-cybercrime.ericoneill.net/p/the-great-escape?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=67-the-year-in-review" target="_blank"><img class="embed__image embed__image--left" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/25761e77-855a-405e-bd50-a7e6b1296241/The_Great_Escape.png?t=1747848655"/><div class="embed__content"><p class="embed__title"> 37: The Great Escape </p><p class="embed__description"> Spies, Lies & Cybercrime by Eric O&#39;Neill - A New Orleans prison escape, a ransomware attack in the UK and spy hunter tips on how to stop scams. </p><p class="embed__link"> spies-lies-cybercrime.ericoneill.net/p/the-great-escape </p></div></a></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">By dissecting a real-world prison escape through a cybersecurity lens, we exposed a parallel that security professionals know too well: systems rarely fail because of sophistication; they fail because someone left a door open. The issue tied together an FBI warning, a DragonForce ransomware attack, and the value of tools like </span><span style="font-family:Helvetica;"><i><b>Have I Been Pwned</b></i></span><span style="font-family:Helvetica;"> to show how breaches unfold in both physical and digital worlds. It was a reminder that the attackers’ greatest asset is often human complacency.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><b>9. Signal-Gate: When a Privacy App Stumbles</b></span></p><div class="embed"><a class="embed__url" href="https://spies-lies-cybercrime.ericoneill.net/p/operation-broken-signal?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=67-the-year-in-review" target="_blank"><img class="embed__image embed__image--left" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/b690fa15-ebc6-4ee2-b2b7-6b9ceed49e60/broken_signal.png?t=1743177883"/><div class="embed__content"><p class="embed__title"> 29: OPERATION BROKEN SIGNAL </p><p class="embed__description"> Spies, Lies & Cybercrime by Eric O&#39;Neill - An explosive look at the Signal chat scandal that exposed U.S. military plans, plus expert cybersecurity tips, a major breach at Oracle, and a review of ChatGPT’s powerful new image tool. Stay ahead of threats with Spies, Lies & Cybercrime. </p><p class="embed__link"> spies-lies-cybercrime.ericoneill.net/p/operation-broken-signal </p></div></a></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">The Signal-gate issue cut through the online hysteria to explain what actually happened, what didn’t, and why it mattered. In a year defined by anxiety over digital surveillance, this piece offered a measured assessment during a week when misinformation traveled faster than facts. It became one of the highest converting stories of the year because readers recognized the need for sober analysis in a space overcrowded with absolutists and alarmists.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><b>10. The Paris Heist</b></span></p><div class="embed"><a class="embed__url" href="https://spies-lies-cybercrime.ericoneill.net/p/the-paris-heist?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=67-the-year-in-review" target="_blank"><img class="embed__image embed__image--left" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/961c18d9-eaa5-4878-85b7-537e703d0b67/Paris_Heist.png?t=1761577936"/><div class="embed__content"><p class="embed__title"> 58: The Paris Heist </p><p class="embed__description"> The Louvre heist exposes the ultimate insider threat: trust. Discover how spies and cybercriminals exploit access in this week’s Spies, Lies & Cybercrime by Eric O&#39;Neill. </p><p class="embed__link"> spies-lies-cybercrime.ericoneill.net/p/the-paris-heist </p></div></a></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">I’ll close the list with one of the year’s most compelling narrative pieces: a field story rooted in tension, tradecraft, and the enduring truth that information is power. Readers responded not because it was cinematic, although it was, but because it illuminated the mindset required to operate in uncertain environments. It reminded you that espionage is not an abstraction. It is a discipline built on patience, awareness, and the relentless pursuit of detail.</span></p><hr class="content_break"><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">As we step into a new year, one thing is certain: the threats will continue to evolve, and the world will not slow down to give anyone time to catch up. But we gather here each week to separate signal from noise, expose the unseen, and navigate the digital battlefield with clarity rather than fear. Thank you for being part of this mission. Stay alert, stay curious, and above all, stay ready. </span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">And here’s hoping that your 2026 is happy, joyous and filled with success! </span></p><p class="paragraph" style="text-align:left;">~ <span style="font-family:Lato,"Open Sans","Segoe UI",Tahoma,sans-serif;">Eric</span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/a5ad56f6-15dc-4661-9555-2963ba3993bb/IMG_1991.jpeg?t=1766241227"/></div><h1 class="heading" style="text-align:left;" id="get-the-book-spies-lies-and-cybercr">Get the Book: Spies, Lies, and Cybercrime</h1><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/ec66a76c-f8b5-4e50-9881-eecfc955d2be/2026.png?t=1767026123"/></div><p class="paragraph" style="text-align:left;">If you haven’t already, please buy <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=67-the-year-in-review" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">SPIES, LIES, AND CYBERCRIME</a></span>. If you already have, thank you, and please consider gifting some to friends and colleagues. It’s the perfect holiday gift and stocking stuffer! </p><p class="paragraph" style="text-align:left;"><b>Please</b> Leave a 5-star review on <span style="text-decoration:underline;"><a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=67-the-year-in-review" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Amazon</a></span> or on <span style="text-decoration:underline;"><a class="link" href="https://www.goodreads.com/book/show/228909676-spies-lies-and-cybercrime?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=67-the-year-in-review" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Goodreads</a></span>.</p><p class="paragraph" style="text-align:left;">📖 Support a local bookstore. Get a <span style="text-decoration:underline;"><a class="link" href="https://www.kensingtonrowbookshop.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=67-the-year-in-review" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Signed copy</a></span></p><p class="paragraph" style="text-align:left;">🎤  I’m on the road doing speaking events. If your company or organization is interested in bringing me to a stage in 2026, <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/contact/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=67-the-year-in-review" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">book me to speak at your next event</a></span>.</p><p class="paragraph" style="text-align:left;"><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">If you’ve ever paused at an email, login alert, or message and thought, </span><i>“Could this happen to me?”</i><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">—my </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(12, 74, 110)">Linkedin Learning course</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;"> is for you! Login and start learning </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(12, 74, 110)">here</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">My new hub, PROTECT, is now live at </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=67-the-year-in-review" target="_blank" rel="noopener noreferrer nofollow">ericoneill.net/protect</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;"> and it’s built for anyone who wants to stop cybercriminal scammers cold.</span></p><hr class="content_break"><p class="paragraph" style="text-align:left;">Coming soon on January 13! A conversation with Actor, Producer and Director Ryan Phillippe, the man that played me in the movie Breach. Subscribe now to ensure you don’t miss the amazing content I’m cooking up for 2026. </p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/e75tUWjByD8" width="100%"></iframe><p class="paragraph" style="text-align:left;">Don’t miss a newsletter! <a class="link" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=67-the-year-in-review" target="_blank" rel="noopener noreferrer nofollow">Subscribe</a> to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=67-the-year-in-review"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><hr class="content_break"><p class="paragraph" style="text-align:left;">Support our partners so that I can bring you this newsletter completely free! It only takes a click. No purchase necessary.</p><h3 class="heading" style="text-align:left;" id="invest-right-from-your-couch">Invest right from your couch</h3><div class="image"><a class="image__link" href="https://secure.money.com/pr/n77dd9870d03?apxa3=1014&utm_campaign={{publication_alphanumeric_id}}&utm_medium=email&utm_source=beehiiv&utm_content=VersionB&_bhiiv=opp_030bbec0-3b57-4660-907d-c49e3cd5c7ea_2bf4b38b&bhcl_id=4e212e85-d7b9-40bd-8873-4feeb4f5ecd8_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/daf5dc34-a6f1-407b-8468-c75a26c615fe/young-woman-juggling-credit-cards__1_.jpg?t=1759431100"/></a></div><p class="paragraph" style="text-align:left;">Have you always been kind of interested in investing but found it too intimidating (or just plain boring)? Yeah, we get it. Luckily, today’s brokers are a little less Wall Street and much more accessible. Online stockbrokers provide a much more user-friendly experience to buy and sell stocks—right from your couch. Money.com put together a list of the <a class="link" href="https://secure.money.com/pr/n77dd9870d03?apxa3=1014&utm_campaign={{publication_alphanumeric_id}}&utm_medium=email&utm_source=beehiiv&utm_content=VersionB&_bhiiv=opp_030bbec0-3b57-4660-907d-c49e3cd5c7ea_2bf4b38b&bhcl_id=4e212e85-d7b9-40bd-8873-4feeb4f5ecd8_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Best Online Stock Brokers</a> to help you open your first account. Check it out!</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://secure.money.com/pr/n77dd9870d03?apxa3=1014&utm_campaign={{publication_alphanumeric_id}}&utm_medium=email&utm_source=beehiiv&utm_content=VersionB&_bhiiv=opp_030bbec0-3b57-4660-907d-c49e3cd5c7ea_2bf4b38b&bhcl_id=4e212e85-d7b9-40bd-8873-4feeb4f5ecd8_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Start investing</a></p><p class="paragraph" style="text-align:left;"></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=40a60c79-5274-4c3a-bf27-9f858fb2af33&utm_medium=post_rss&utm_source=spies_lies_cybercrime">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>66: The December My Life Changed</title>
  <description>Spies, Lies &amp; Cybercrime by Eric O&#39;Neill</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/dbff4702-b569-49b7-bf42-e4a4e4fe5f61/Untitled_2.png" length="982047" type="image/png"/>
  <link>https://spies-lies-cybercrime.ericoneill.net/p/the-december-my-life-changed</link>
  <guid isPermaLink="true">https://spies-lies-cybercrime.ericoneill.net/p/the-december-my-life-changed</guid>
  <pubDate>Tue, 23 Dec 2025 14:03:20 +0000</pubDate>
  <atom:published>2025-12-23T14:03:20Z</atom:published>
    <dc:creator>Eric ONeill</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><h1 class="heading" style="text-align:left;" id="merry-christmas-happy-hanukah-happy">Merry Christmas, Happy Hanukah, Happy Holidays!</h1><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/73cbb1f0-54e3-4c73-b2d6-3910e1db65b7/Gemini_Generated_Image_ycn45vycn45vycn4.png?t=1766241481"/></div><p class="paragraph" style="text-align:left;">It was a freezing December morning, just a couple of weeks before Christmas, when the course of my life changed within a single conversation.</p><p class="paragraph" style="text-align:left;">Juliana stirred beside me, buried under a thick comforter, her blonde hair a wild halo against the pillow. We were newly married, still in that stunned, grateful phase where waking up next to the right person feels like winning the lottery every day (it still does). I checked the clock. 8:00 a.m. I was about to hang up the phone, chalking it up to an early telemarketer, when the voice on the other stopped me cold.</p><p class="paragraph" style="text-align:left;">It was Supervisory Special Agent Gene McClelland.</p><p class="paragraph" style="text-align:left;">“Don’t bother getting dressed up,” he said. “Just lace up your shoes. I’m parked out front.”</p><p class="paragraph" style="text-align:left;">That was all.</p><p class="paragraph" style="text-align:left;">I scrambled into jeans and a George Washington University Law sweatshirt, heart pounding, mind sprinting through worst-case scenarios. FBI supervisors don’t <i>come</i> to you. They summon. If your boss showed up unannounced at your house on a Sunday morning, you’d panic. If you are the boss, picture the chairman of your board of directors. If you’re the chairman—imagine the President of the United States idling at the curb.</p><p class="paragraph" style="text-align:left;">This was worse than any of that.</p><p class="paragraph" style="text-align:left;">Our cramped one-bedroom sat a stone’s throw from the Capitol. I slipped outside into the December wind, doing a quick sweep of rooftops and balconies out of habit. Nothing. Just a cardinal perched on a wire and a lone sedan idling on the street. Gene’s.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/7833953c-c154-4718-b836-0c4c63c93631/gene.png?t=1766242283"/></div><p class="paragraph" style="text-align:left;">I opened the passenger door. He didn’t bother with small talk.</p><p class="paragraph" style="text-align:left;">“Have you ever heard of Robert Hanssen?”</p><p class="paragraph" style="text-align:left;">“No,” I said. “Should I have?”</p><p class="paragraph" style="text-align:left;">Gene smiled. “That’s good. That’s why we chose you.”</p><p class="paragraph" style="text-align:left;">That December morning, so ordinary in appearance, but world-shifting in impact, catapulted me into the undercover operation that defined my life.</p><p class="paragraph" style="text-align:left;">And every year around this time, when the air turns sharp and the world slows down, I think about that morning. I think about the unexpected summons that changed my stars…and the opportunities that still arrive the same way: unannounced, unwarned, and exactly when they’re meant to.</p><p class="paragraph" style="text-align:left;">This is the week when I force myself to step out of the fray. I take a breath. I look at my life’s blessings—my incredible family, long walks with my wife of twenty-five years, phone calls with friends I don’t see nearly enough, a good book by a quiet fire, bourbon with a best friend, my kids’ hugs, a real dinner with real conversation. I shut down the computers, power off the iPads, and step away from Instagram, YouTube, Facebook, X, and yes…even this newsletter.</p><p class="paragraph" style="text-align:left;">But before I disappear from cyberspace for a few days, I needed to send this.</p><h1 class="heading" style="text-align:center;" id="thank-you"><span style="color:#030712;"><b>Thank you.</b></span></h1><p class="paragraph" style="text-align:left;">This newsletter exists because of you—my readers, my community, my fellow spy hunters. When I launched this project, I envisioned it as the living companion to <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=66-the-december-my-life-changed" target="_blank" rel="noopener noreferrer nofollow"><i>Spies, Lies, and Cybercrime</i></a>: a place where the book could continue to breathe, evolve, and grow. A space where I could tell new stories, share actionable intelligence, and equip people who care about protecting themselves and their world from cybercrime, scams, and espionage.</p><p class="paragraph" style="text-align:left;">You seized that vision. You’ve allowed me to continue the conversation.</p><p class="paragraph" style="text-align:left;">This year, the newsletter grew by <b>980%</b>. That number still looks like a typo. But it’s real—and it’s because you showed up, shared it, forwarded it, talked about it, and made this community something fierce and meaningful (please don’t stop!)</p><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/48e7f3b9-d36f-4605-9258-d1c911e11443/beehiiv-rewind-slide-2-square.png?t=1766241335"/></div></td><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/bd388f1e-feef-4f3d-9eb9-da4731f89e2d/beehiiv-rewind-slide-6-square.png?t=1766241344"/></div></td></tr></table><p class="paragraph" style="text-align:left;">And when <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=66-the-december-my-life-changed" target="_blank" rel="noopener noreferrer nofollow"><i>Spies, Lies, and Cybercrime</i></a> launched this fall, you propelled it straight onto the <a class="link" href="https://www.usatoday.com/booklist/books/spies-lies-and-cybercrime-cybersecurity-tactics-to-outsmart-hackers-and-disarm-scammers/9780063398177/2025-10-15?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=66-the-december-my-life-changed" target="_blank" rel="noopener noreferrer nofollow"><b>Bestseller list in its first week</b></a>. That wasn’t the result of marketing dollars or industry machinery. <span style="text-decoration:underline;">That was you</span>. A group of intelligent, curious, generous readers who believed in the mission and carried it forward.</p><p class="paragraph" style="text-align:left;">Through this newsletter, the book continues to live. It breathes through you. Together, we’ve built a small but formidable battalion of well-trained, well-informed, occasionally wise-cracking spy hunters who are making the world, and ourselves, a little safer from the cybercriminals who attack from the dark web.</p><p class="paragraph" style="text-align:left;">Before I step offline and vanish into my holiday hideout, let me say it plainly:</p><p class="paragraph" style="text-align:center;"><b>Thank you</b> for an extraordinary year.</p><p class="paragraph" style="text-align:center;"><b>Thank you</b> for your trust.</p><p class="paragraph" style="text-align:center;"><b>Thank you </b>for your curiosity.</p><p class="paragraph" style="text-align:center;"><b>Thank you </b>for your belief in this mission.</p><p class="paragraph" style="text-align:left;">And <b>thank you</b> for being the unexpected summons at my door—the kind that changes a life.</p><p class="paragraph" style="text-align:left;">I’ll see you on the other side of the holidays. We’ve got more stories to tell, more intel to share, and more spies (both real and metaphorical) to hunt before they hunt us.</p><p class="paragraph" style="text-align:left;">Until then, Merry Christmas. May your holiday be safe, merry and bright.</p><p class="paragraph" style="text-align:left;">-Eric</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/a5ad56f6-15dc-4661-9555-2963ba3993bb/IMG_1991.jpeg?t=1766241225"/><div class="image__source"><span class="image__source_text"><p>This one is for you!</p></span></div></div><hr class="content_break"><h1 class="heading" style="text-align:left;" id="get-the-book-spies-lies-and-cybercr">Get the Book: Spies, Lies, and Cybercrime</h1><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/c7826977-eea1-408e-b511-074370b90839/stockings.png?t=1766241388"/></div><p class="paragraph" style="text-align:left;">If you haven’t already, please buy <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=66-the-december-my-life-changed" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">SPIES, LIES, AND CYBERCRIME</a></span>. If you already have, thank you, and please consider gifting some to friends and colleagues. It’s the perfect holiday gift and stocking stuffer! </p><p class="paragraph" style="text-align:left;"><b>Please</b> Leave a 5-star review on <span style="text-decoration:underline;"><a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=66-the-december-my-life-changed" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Amazon</a></span> or on <span style="text-decoration:underline;"><a class="link" href="https://www.goodreads.com/book/show/228909676-spies-lies-and-cybercrime?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=66-the-december-my-life-changed" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Goodreads</a></span>.</p><p class="paragraph" style="text-align:left;">📖 Support a local bookstore. Get a <span style="text-decoration:underline;"><a class="link" href="https://www.kensingtonrowbookshop.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=66-the-december-my-life-changed" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Signed copy</a></span></p><p class="paragraph" style="text-align:left;">🎤  I’m on the road doing speaking events. If your company or organization is interested in bringing me to a stage in 2026, <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/contact/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=66-the-december-my-life-changed" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">book me to speak at your next event</a></span>.</p><p class="paragraph" style="text-align:left;"><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">If you’ve ever paused at an email, login alert, or message and thought, </span><i>“Could this happen to me?”</i><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">—my </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(12, 74, 110)">Linkedin Learning course</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;"> is for you! Login and start learning </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(12, 74, 110)">here</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;">My new hub, PROTECT, is now live at </span><span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=66-the-december-my-life-changed" target="_blank" rel="noopener noreferrer nofollow">ericoneill.net/protect</a></i></span></span><span style="color:rgb(45, 45, 45);font-family:Helvetica, Arial, sans-serif;font-size:16px;"> and it’s built for anyone who wants to stop cybercriminal scammers cold.</span></p><hr class="content_break"><p class="paragraph" style="text-align:left;">Coming soon in 2026! A conversation with Actor, Producer and Director Ryan Phillippe, the man that played me in the movie Breach. subscribe now to ensure you don’t miss the amazing content I’m cooking up for 2026. </p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/e75tUWjByD8" width="100%"></iframe><p class="paragraph" style="text-align:left;">Don’t miss a newsletter! <a class="link" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=66-the-december-my-life-changed" target="_blank" rel="noopener noreferrer nofollow">Subscribe</a> to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=66-the-december-my-life-changed"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><hr class="content_break"><p class="paragraph" style="text-align:left;">Please support our partners. It only takes a click. No purchase necessary!</p><h3 class="heading" style="text-align:left;" id="7-actionable-ways-to-achieve-a-comf">7 Actionable Ways to Achieve a Comfortable Retirement</h3><div class="image"><a class="image__link" href="https://pembletonfinancial.com/?a=1376&c=20615&s1={{publication_alphanumeric_id}}&_bhiiv=opp_afa79a03-75d4-470a-9319-0d615d6f098d_191e16fc&bhcl_id=617acc26-76de-4431-82bc-388351f02668_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/b082226b-ca4d-4c06-b047-9489fe099f48/CoupleBoatBlueSweater_1200x600.jpg?t=1753290945"/></a></div><p class="paragraph" style="text-align:left;">Your dream retirement isn’t going to fund itself—that’s what your portfolio is for.</p><p class="paragraph" style="text-align:left;">When generating income for a comfortable retirement, there are countless options to weigh. Muni bonds, dividends, REITs, Master Limited Partnerships—each comes with risk and oppor-tunity.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://pembletonfinancial.com/?a=1376&c=20615&s1={{publication_alphanumeric_id}}&_bhiiv=opp_afa79a03-75d4-470a-9319-0d615d6f098d_191e16fc&bhcl_id=617acc26-76de-4431-82bc-388351f02668_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">The Definitive Guide to Retirement Income</a> from Fisher investments shows you ways you can position your portfolio to help you maintain or improve your lifestyle in retirement.</p><p class="paragraph" style="text-align:left;">It also highlights common mistakes, such as tax mistakes, that can make a substantial differ-ence as you plan your well-deserved future.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://pembletonfinancial.com/?a=1376&c=20615&s1={{publication_alphanumeric_id}}&_bhiiv=opp_afa79a03-75d4-470a-9319-0d615d6f098d_191e16fc&bhcl_id=617acc26-76de-4431-82bc-388351f02668_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Download your free copy today.</a></p><p class="paragraph" style="text-align:left;"></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=837f1ecb-7ddd-429e-832b-264176626289&utm_medium=post_rss&utm_source=spies_lies_cybercrime">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>65: Junk Food For The Brain</title>
  <description>Spies, Lies &amp; Cybercrime by Eric O&#39;Neill</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/7992b698-bdee-47b1-8a5c-15fc131919e8/issue_65.png" length="1158224" type="image/png"/>
  <link>https://spies-lies-cybercrime.ericoneill.net/p/junk-food-for-the-brain</link>
  <guid isPermaLink="true">https://spies-lies-cybercrime.ericoneill.net/p/junk-food-for-the-brain</guid>
  <pubDate>Tue, 16 Dec 2025 14:03:16 +0000</pubDate>
  <atom:published>2025-12-16T14:03:16Z</atom:published>
    <dc:creator>Eric ONeill</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b><a class="link" href="#title-story" rel="noopener noreferrer nofollow">Title Story: </a></b>How social media became junk food for the developing brain—and why Australia finally said no.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#cybersecurity-breach-of-the-week" rel="noopener noreferrer nofollow">Cybersecurity Breach of the Week: </a></b>Russia’s cyberattack on Germany shows how quietly war now unfolds online.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#cybersecurity-tip-of-the-week" rel="noopener noreferrer nofollow">Cybersecurity Tip of the Week:</a></b><a class="link" href="#cybersecurity-tip-of-the-week" rel="noopener noreferrer nofollow"> </a>Hundreds of millions of stolen passwords are circulating—here’s how to see if yours is one of them.</p><p class="paragraph" style="text-align:left;"><a class="link" href="#coming-soon" rel="noopener noreferrer nofollow">Coming Soon: </a>What Hollywood acting and undercover espionage have in common, according to Ryan Phillippe.</p></div><h1 class="heading" style="text-align:left;" id="title-story">Title Story</h1><h2 class="heading" style="text-align:left;" id="junk-food-for-the-brain">JUNK FOOD FOR THE BRAIN</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/7992b698-bdee-47b1-8a5c-15fc131919e8/issue_65.png?t=1765814134"/></div><p class="paragraph" style="text-align:left;">I came of age in a time when silence was not an emergency. If a conversation stalled, no one reached for anything. There was nothing to reach for. We sat with the pause until it filled itself—often awkwardly, sometimes brilliantly—with gossip, speculation, or the kind of half-formed dreams that only sound plausible when spoken aloud among friends. We met at malls and on street corners and in basements that smelled faintly of soda and rebellion. We were unsupervised, occasionally bored, and fully present.</p><p class="paragraph" style="text-align:left;">Today, silence has become intolerable. The briefest lull in conversation is enough to summon a phone from a pocket, as if on reflex. Heads bow. Eyes glaze. What might have become connection is swallowed instead by a feed designed to erase the very sensation of being alone with one’s thoughts. For teenagers, this ritual has become so normalized that the absence of a screen now feels abnormal, even threatening.</p><h4 class="heading" style="text-align:left;" id="australia-pulls-the-plug"><b>Australia Pulls the Plug</b></h4><p class="paragraph" style="text-align:left;">Which is why <a class="link" href="https://www.bbc.com/news/articles/cwyp9d3ddqyo?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow">Australia’s recent decision to ban social media for children under sixteen</a> feels less like a regulatory tweak and more like a cultural rupture.</p><p class="paragraph" style="text-align:left;">Beginning this week, platforms including Instagram, TikTok, Snapchat, YouTube, Reddit, and X are legally required to block users under sixteen or face substantial fines. The burden of enforcement falls not on children or parents but squarely on the companies themselves, many of which have spent years insisting that their existing safeguards were sufficient.</p><p class="paragraph" style="text-align:left;">The stated rationale is familiar: social media has been linked to rising rates of anxiety, depression, body-image distortion, bullying, sexual exploitation, and criminal extortion among adolescents. What’s new is the willingness of a government to treat these harms not as unfortunate side effects of innovation but as predictable outcomes of an often malicious algorithm.</p><p class="paragraph" style="text-align:left;">Critics have raised objections that sound, by now, almost ritualistic. Free speech concerns. Privacy concerns. Lawsuits filed by teenagers who argue that their political expression is being curtailed. Tech companies warning that age verification technologies are imperfect, intrusive, or easily circumvented. All of which may be true, and all of which feel curiously bloodless when weighed against the mental-health data accumulating over the past decade.</p><h4 class="heading" style="text-align:left;" id="the-great-rewiring-of-childhood">The Great Rewiring of Childhood</h4><p class="paragraph" style="text-align:left;">Jonathan Haidt, in his recent book <a class="link" href="https://www.amazon.com/Anxious-Generation-Rewiring-Childhood-Epidemic/dp/B0C9N2L56X/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow"><i>The Anxious Generation</i></a>, describes what he calls the “great rewiring” of childhood. For most of human history, children learned to regulate fear, build confidence, and negotiate social hierarchies through unstructured play. Then, between 2010 and 2015, that model collapsed with startling speed. The play-based childhood was replaced by a phone-based one, mediated by platforms that reward comparison, performance, and perpetual self-surveillance.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/848da421-57b6-4827-b0e8-4c099a9d4a7f/rewired.png?t=1765814193"/></div><p class="paragraph" style="text-align:left;">The timing is difficult to ignore. Prior to 2010, rates of adolescent anxiety and depression were relatively stable. Afterward, they surged. By 2019, one in four American undergraduates reported struggling with anxiety or depression. Among teenage girls, rates climbed even higher, with nearly a third reporting that they had seriously considered suicide within the past year. Similar patterns have appeared across the United Kingdom, Australia, and much of Northern Europe, suggesting that culture alone cannot explain what is happening.</p><p class="paragraph" style="text-align:left;">What social media offers young users is not, as advertised, connection, but something closer to a hall of mirrors. Every post becomes a referendum. Every image invites comparison. Every silence feels like exclusion. The algorithms, exquisitely tuned, deliver what keeps users scrolling rather than what might help them grow. It is <b>junk food for the brain</b>: instantly gratifying, nutritionally empty, and difficult to stop consuming once the habit is formed.</p><h4 class="heading" style="text-align:left;" id="everyone-else-has-one">“Everyone Else Has One”</h4><p class="paragraph" style="text-align:left;">Parents are acutely aware of this, and yet many feel trapped by what economists would call a collective-action problem. When every other child appears to be online, withholding access can feel like a social punishment rather than a protective measure. Australia’s ban, whatever its imperfections, breaks that trap by resetting the default. When no one under sixteen is allowed in, the pressure to join evaporates.</p><h4 class="heading" style="text-align:left;" id="could-this-happen-here">Could This Happen Here?</h4><p class="paragraph" style="text-align:left;">Whether such a policy could take hold in the United States remains an open question. Federal action seems unlikely in the near term, hampered by political gridlock and formidable lobbying from the technology sector. Yet state-level restrictions are proliferating, and courts have already shown a willingness to uphold age-based limits in other online contexts. Even the platforms themselves appear to be preparing, quietly developing age-estimation tools that suggest an awareness that the ground beneath them is shifting.</p><p class="paragraph" style="text-align:left;">For a generation raised to believe that connection is something delivered through glass, Australia has proposed a radical idea—that perhaps it is something best learned face to face, in moments of boredom, silence, and imperfect human company. Whether the rest of the world is prepared to follow may determine what childhood looks like in the decades to come.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="cybersecurity-breach-of-the-week">Cybersecurity Breach of the Week</h1><h2 class="heading" style="text-align:left;" id="russias-cyberwar-against-germany">Russia’s Cyberwar Against Germany</h2><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.dw.com/en/germany-summons-russian-ambassador-over-hybrid-attacks/a-75129486?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow">Germany has accused Russian military intelligence</a> of conducting a cyberattack against its air traffic control systems and attempting to interfere in its federal elections—an escalation that underscores how cyber operations are now being used as instruments of state power.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/45f845d3-002a-4385-a5b2-77cfb1dd4962/Gemini_Generated_Image_kyk57qkyk57qkyk5.png?t=1765813801"/></div><p class="paragraph" style="text-align:left;">German officials say the GRU-linked hacking group Fancy Bear breached internal communications at the country’s air navigation service provider in August 2024. Flights were not disrupted, but the target matters: air traffic control is critical infrastructure. At the same time, Germany alleges Russia ran a coordinated disinformation campaign, Storm 1516, aimed at destabilizing the February election, including fake videos claiming ballot manipulation and attacks on senior political leaders.</p><p class="paragraph" style="text-align:left;">Berlin has summoned the Russian ambassador and vowed coordinated countermeasures with European allies. Moscow has denied the allegations, as it routinely does.</p><p class="paragraph" style="text-align:left;">This case highlights an uncomfortable reality Western governments must confront: cyberattacks by nation-state actors, especially against critical infrastructure, should be treated as acts of war. The same seriousness reserved for kinetic attacks must apply in cyberspace.</p><p class="paragraph" style="text-align:left;">The United States should lead by establishing a mutually assured destruction deterrence model for cyber warfare, similar to the nuclear Cold War. Until adversaries fear overwhelming consequences, cyberattacks like this will continue—quietly, cheaply, and dangerously.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="protect-yourself-starting-today">Protect Yourself—Starting Today</h1><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/c1dea13d-4698-4bc2-96f3-66d208dcaa82/Linkedin_Learning.png?t=1765591974"/></div><p class="paragraph" style="text-align:left;">My new hub, PROTECT, is now live at <a class="link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow">ericoneill.net/protect</a> and it’s built for anyone who wants to stop cybercriminal scammers cold. </p><p class="paragraph" style="text-align:left;">IIf you haven’t already, please buy <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">SPIES, LIES, AND CYBERCRIME</a></span>. If you already have, thank you, and please consider gifting the book to friends and colleagues. It’s the perfect holiday gift! You can also get a <span style="text-decoration:underline;"><a class="link" href="https://www.kensingtonrowbookshop.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Signed copy</a></span>.</p><p class="paragraph" style="text-align:left;">Please leave a 5-star review on <span style="text-decoration:underline;"><a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Amazon</a></span> or on <span style="text-decoration:underline;"><a class="link" href="https://www.goodreads.com/book/show/228909676-spies-lies-and-cybercrime?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Goodreads</a></span>.</p><p class="paragraph" style="text-align:left;">If you’ve ever paused at an email, login alert, or message and thought, <i>“Could this happen to me?”</i>—my <a class="link" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow">Linkedin Learning course</a> is for you! Login and start learning <a class="link" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p><div class="embed"><a class="embed__url" href="https://www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank"><div class="embed__content"><p class="embed__title"> Spies, Lies, and Cybercrime: How Thinking Like a Spy Hunter Can Protect You from Cyberattacks Online Class | LinkedIn Learning, formerly Lynda.com </p><p class="embed__description"> Discover how to think like a spy by protecting yourself from scams, safeguarding your data, and making informed decisions to stay one step ahead of cyber criminals. </p><p class="embed__link"> www.linkedin.com/learning/spies-lies-and-cybercrime-how-thinking-like-a-spy-hunter-can-protect-you-from-cyberattacks </p></div><img class="embed__image embed__image--right" src="https://media.licdn.com/dms/image/v2/D4D0DAQGWZwDWytKKwg/learning-public-crop_675_1200/B4DZTcfTACHkAY-/0/1738865980078?e=2147483647&v=beta&t=Zn1nvDC0qlhjSov1mj3HgQ6PJcTNgmTbLZmcfWsuPDE"/></a></div><hr class="content_break"><h1 class="heading" style="text-align:left;" id="cybersecurity-tip-of-the-week">Cybersecurity Tip of the Week</h1><p class="paragraph" style="text-align:left;">The FBI has confirmed that <a class="link" href="https://www.forbes.com/sites/daveywinder/2025/12/13/fbi-confirms-630-million-stolen-passwords---how-to-check-yours-now/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow"><i>hundreds of millions</i></a> of stolen passwords were recently recovered from cybercriminals, underscoring just how fragile our online defenses remain. Cybercriminals collect and trade these credentials on underground forums and use them to break into accounts across the internet.</p><p class="paragraph" style="text-align:left;"><b>Here’s what you should do right now:</b></p><p class="paragraph" style="text-align:left;"><b>1. Check if your email or passwords have been exposed.</b></p><p class="paragraph" style="text-align:left;">Use the trusted <a class="link" href="https://haveibeenpwned.com?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow"><i>Have I Been Pwned</i></a> service to see whether your email address (or individual passwords) has shown up in known breaches. This tool lets you check safely without sending your full password to anyone.</p><div class="embed"><a class="embed__url" href="https://haveibeenpwned.com?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank"><div class="embed__content"><p class="embed__title"> Have I Been Pwned: Check if your email address has been exposed in a data breach </p><p class="embed__description"> Have I Been Pwned allows you to check whether your email address has been exposed in a data breach. </p><p class="embed__link"> haveibeenpwned.com </p></div><img class="embed__image embed__image--right" src="https://haveibeenpwned.com/Images/OpenGraphPreview.jpg"/></a></div><p class="paragraph" style="text-align:left;"><b>2. Change compromised passwords immediately.</b></p><p class="paragraph" style="text-align:left;">If a check shows your login details have been leaked, change that password <i>right away</i>—and don’t reuse it on any other site. Credential stuffing attacks let hackers take one leaked password and try it on dozens of other services.</p><p class="paragraph" style="text-align:left;"><b>3. Use unique, strong passwords everywhere.</b></p><p class="paragraph" style="text-align:left;">Password reuse is one of the biggest risks you face. A strong password manager can generate and store complex, unique passwords so you don’t have to memorize them.</p><p class="paragraph" style="text-align:left;"><b>4. Enable Two-Factor Authentication (2FA).</b></p><p class="paragraph" style="text-align:left;">Even the best password can be stolen. Turning on 2FA adds an extra step—typically a code from an app or SMS—that keeps attackers out even if they have your password. This is the single, most important action you can take to secure your accounts.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="coming-soon">Coming Soon!</h1><p class="paragraph" style="text-align:left;">I recently sat down with A-list actor, producer, and director <a class="link" href="https://www.imdb.com/name/nm0000202/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow">Ryan Phillippe</a> for a conversation that revolved around a single question he once asked me during a break in filming <a class="link" href="https://www.imdb.com/title/tt0401997/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow">Breach</a>: what, exactly, does a Hollywood actor have in common with an undercover operative? The answer turned out to be more revealing than either of us expected. The interview will premiere exclusively here for subscribers on January 6—so make sure you’re <a class="link" href="https://spies-lies-cybercrime.ericoneill.net/subscribe?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow">subscribed</a>. You won’t want to miss it.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://spies-lies-cybercrime.ericoneill.net/subscribe?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain"><span class="button__text" style=""> Subscribe </span></a></div><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/dedafb6a-d115-496f-84e8-f3d50820ea9a/key_Screenshot_2025-11-26_at_4.05.53_PM.png?t=1765812840"/></div><hr class="content_break"><p class="paragraph" style="text-align:left;">Please give some love to our sponsors. It only takes a click. No purchase required.</p><h3 class="heading" style="text-align:left;" id="7-actionable-ways-to-achieve-a-comf">7 Actionable Ways to Achieve a Comfortable Retirement</h3><div class="image"><a class="image__link" href="https://pembletonfinancial.com/?a=1376&c=20615&s1={{publication_alphanumeric_id}}&_bhiiv=opp_13fa051a-5fff-4758-b719-556890da5504_191e16fc&bhcl_id=26ece593-2f1c-4bd6-b372-8973dd7298ae_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/b082226b-ca4d-4c06-b047-9489fe099f48/CoupleBoatBlueSweater_1200x600.jpg?t=1753290945"/></a></div><p class="paragraph" style="text-align:left;">Your dream retirement isn’t going to fund itself—that’s what your portfolio is for.</p><p class="paragraph" style="text-align:left;">When generating income for a comfortable retirement, there are countless options to weigh. Muni bonds, dividends, REITs, Master Limited Partnerships—each comes with risk and oppor-tunity.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://pembletonfinancial.com/?a=1376&c=20615&s1={{publication_alphanumeric_id}}&_bhiiv=opp_13fa051a-5fff-4758-b719-556890da5504_191e16fc&bhcl_id=26ece593-2f1c-4bd6-b372-8973dd7298ae_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">The Definitive Guide to Retirement Income</a> from Fisher investments shows you ways you can position your portfolio to help you maintain or improve your lifestyle in retirement.</p><p class="paragraph" style="text-align:left;">It also highlights common mistakes, such as tax mistakes, that can make a substantial differ-ence as you plan your well-deserved future.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://pembletonfinancial.com/?a=1376&c=20615&s1={{publication_alphanumeric_id}}&_bhiiv=opp_13fa051a-5fff-4758-b719-556890da5504_191e16fc&bhcl_id=26ece593-2f1c-4bd6-b372-8973dd7298ae_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Download your free copy today.</a></p><hr class="content_break"><h3 class="heading" style="text-align:left;" id="like-what-youre-reading"><b>Like What You&#39;re Reading?</b></h3><p class="paragraph" style="text-align:left;">Don’t miss a newsletter! <a class="link" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain" target="_blank" rel="noopener noreferrer nofollow">Subscribe</a> to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=65-junk-food-for-the-brain"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><h2 class="heading" style="text-align:left;" id="are-you-protected">Are you protected?</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/28232f04-732b-43ed-95f9-c2e775784f2e/Aura-Review.png?t=1742829748"/></div><div style="padding:14px 15px 14px;"><table class="bh__table" width="100%" style="border-collapse:collapse;"><tr class="bh__table_row"><td class="bh__table_cell" width="100%"><p class="paragraph" style="text-align:left;">Recently nearly 3 billion records containing all our sensitive data was exposed on the dark web for criminals, fraudsters and scammers to data mine for identity fraud. Was your social security number and birthdate exposed? Identity threat monitoring is now a must to protect yourself? <span style="color:inherit;"><span style="text-decoration:underline;"><i><a class="link" href="https://www.aura.com/eric?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=51-the-china-trap" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(12, 74, 110)">Use this affiliate link</a></i></span></span> to get up to <b>60% off </b>of Aura’s Cybersecurity, Identity monitoring and threat detecting software.</p></td></tr></table></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=6de480df-9e54-42a5-92ca-01b44d2c0fbc&utm_medium=post_rss&utm_source=spies_lies_cybercrime">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>64: The Mustang Con: Inside a Perfect Online Car Scam</title>
  <description>Spies, Lies &amp; Cybercrime by Eric O&#39;Neill</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/e00ffe0d-7d45-4c50-8e4e-a1d2d63177c6/title_64.png" length="980115" type="image/png"/>
  <link>https://spies-lies-cybercrime.ericoneill.net/p/the-mustang-con-inside-a-perfect-online-car-scam</link>
  <guid isPermaLink="true">https://spies-lies-cybercrime.ericoneill.net/p/the-mustang-con-inside-a-perfect-online-car-scam</guid>
  <pubDate>Tue, 09 Dec 2025 14:03:27 +0000</pubDate>
  <atom:published>2025-12-09T14:03:27Z</atom:published>
    <dc:creator>Eric ONeill</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b><a class="link" href="#title-story" rel="noopener noreferrer nofollow">Title Story: </a></b>A hard-boiled attorney takes the bait on a too-perfect Mustang listing, revealing how even seasoned pros can get outplayed by modern cybercriminals.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#cybersecurity-tip-of-the-week" rel="noopener noreferrer nofollow">Cybersecurity Tip of the Week:</a></b><a class="link" href="#cybersecurity-tip-of-the-week" rel="noopener noreferrer nofollow"> </a>A breakdown of how the con worked and how real spycraft principles could have exposed it before a single dollar moved.</p><p class="paragraph" style="text-align:left;"><a class="link" href="#technology-news-of-the-week" rel="noopener noreferrer nofollow">Technology News of the Week: </a>Netflix’s announced Acquisition of Warner Bros and HBO means tons of content for you and a powerful blow to Hollywood.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#appearance-of-the-week" rel="noopener noreferrer nofollow">Appearance of the Week:</a></b><a class="link" href="#appearance-of-the-week" rel="noopener noreferrer nofollow"> </a>I join the Cybersecurity Readiness Podcast to discuss the Robert Hanssen case, the new book, digital deception, insider threats, and AI-powered social engineering at scale. </p><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-trend-of-the-week" rel="noopener noreferrer nofollow">AI Trend Of the Week</a>: Superman and Supergirl (all of the characters from history) compete in a girls vs. guys night out. Who wins? </p></div><h1 class="heading" style="text-align:left;" id="title-story">Title Story</h1><h2 class="heading" style="text-align:left;" id="the-mustang-con-inside-a-perfect-on">The Mustang Con: Inside a Perfect Online Car Scam</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/e00ffe0d-7d45-4c50-8e4e-a1d2d63177c6/title_64.png?t=1764884781"/></div><p class="paragraph" style="text-align:left;">Teddy spent his entire career cutting through lies. A criminal defense attorney with the kind of sharpened instincts you only earn from years of listening to stories that don’t add up. He prided himself on seeing the con before anyone else even sensed the setup. Nothing rattled him. Nothing fooled him. Nothing got past him.</p><p class="paragraph" style="text-align:left;">Until the day he went shopping for a car.</p><p class="paragraph" style="text-align:left;">It started innocently, the way most modern trouble does: a simple scroll through Facebook. He’d just won a major case—a hard-fought victory—and decided he was finally going to reward himself. That’s when he saw it. A 2021 Ford Mustang Shelby GT500 in Grabber Yellow with bold black racing stripes. The exact car he wanted as a kid, back when posters on bedroom walls were as close as he could get to horsepower. He had spent years ignoring that dream. This time, he didn’t.</p><p class="paragraph" style="text-align:left;">The listing read like a wish list: low miles, no accidents, one owner, leather seats, handling package, carbon fiber wheels. The price—fifty-seven thousand—was far below what a GT500 actually commands, but he rationalized it the way any expert negotiator eventually does: maybe he’d stumbled on someone else’s need for a quick sale. Maybe he just got lucky. Even the best of us want to believe we’ve earned a break.</p><p class="paragraph" style="text-align:left;">He did what he believed was due diligence. More than sixty emails traded with a courteous and knowledgeable representative who called himself Frederick Lemos. There were dozens of detailed photos, walk-around videos, documents, ownership reports—all crisp, organized, convincing. They used a Bank of America account. They sent paperwork through DocuSign. Everything looked exactly the way a legitimate online car sale should look. He even paid for his own CarFax, and every detail lined up perfectly with what he’d been told.</p><p class="paragraph" style="text-align:left;">Overconfidence doesn’t announce itself. It feels like competence—right up until the moment it doesn’t. When the invoice arrived, Teddy’s bank refused the transfer because the account lacked an address. A small red flag, nothing more. He asked Lemos, who replied immediately with a branch address in Orlando, which matched the supposed dealership’s location. A quick map search seemed to confirm it. Satisfied, he wired the money.</p><p class="paragraph" style="text-align:left;">Later he would learn the truth: multiple fake auto-seller websites use the same name—Carcoin—mirroring real dealerships without the legitimate businesses ever knowing they’ve been cloned. Fraudsters scrape photos, videos, and documents from real listings, populate a polished new site, and wait for the right buyer to wander in. When one site disappears, another appears, sometimes offering to buy or consign classic cars to gather fresh material for the next round of victims. It’s assembly-line fraud, industrialized deception.</p><p class="paragraph" style="text-align:left;">But at the time, none of this was visible. What Teddy saw was an order number posted on their website and a delivery date for the car. They promised the vehicle would arrive in an enclosed carrier, and that the driver would call twenty-four hours before arrival. The day came. No call. When he emailed Ramos, the order status on the website quietly shifted to “delayed.” The following day, delivery slipped again. This time, he requested a cancellation. The site updated immediately: “Order canceled — refund in process.”</p><p class="paragraph" style="text-align:left;">It was theater. By then, the money was long gone.</p><p class="paragraph" style="text-align:left;">The detail he learned far too late is one every consumer should know: a wire transfer must be recalled within twenty-four hours, or recovery becomes unlikely. After that window closes, you’re no longer chasing a refund—you’re chasing shadows.</p><p class="paragraph" style="text-align:left;">For a man who spent his life unraveling other people’s deceptions, this one carried a particular sting. It wasn’t the money. It wasn’t even the car. It was the realization that expertise in one arena doesn’t grant immunity in another, and that the smartest people often fall the hardest because they don’t believe they can fall at all.</p><p class="paragraph" style="text-align:left;">And that’s the real lesson here: scams don’t succeed because victims are gullible. They succeed because criminals are patient, prepared, and increasingly professional—and because even the sharpest among us sometimes want something badly enough that we stop questioning the story unfolding in front of us.</p><p class="paragraph" style="text-align:left;">Teddy wanted the Mustang. They wanted his money. Only one side got what they came for.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="protect-yourself-starting-today">Protect Yourself—Starting Today</h1><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/cf679b75-e7ba-48e6-8759-1ffcc6a132c8/FC3FCF46-2AFD-4E26-BAFF-333B3ED3AE5F.png?t=1764879388"/></div><p class="paragraph" style="text-align:left;">My new hub, PROTECT, is now live at <a class="link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=64-the-mustang-con-inside-a-perfect-online-car-scam" target="_blank" rel="noopener noreferrer nofollow">ericoneill.net/protect</a> and it’s built for anyone who wants to stop cybercriminal scammers cold. </p><p class="paragraph" style="text-align:left;">Inside, you’ll get the exact steps to take the moment your accounts are compromised, how to lock them down before criminals get in, and how to spot the scams hitting elders, teens, and anyone with a pulse and a Wi-Fi signal. There’s even a crash course on beating deepfakes—because they’re cheap, everywhere, and entirely too convincing. </p><p class="paragraph" style="text-align:left;">If you want the full battle manual, that’s in Spies, Lies and Cybercrime. If you want to start protecting yourself right now? Begin here: <a class="link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=64-the-mustang-con-inside-a-perfect-online-car-scam" target="_blank" rel="noopener noreferrer nofollow">ericoneill.net/protect</a> Now—on to this week’s tip.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="cybersecurity-tip-of-the-week">Cybersecurity Tip of the Week </h1><h2 class="heading" style="text-align:left;" id="defeating-the-mustang-gt-500-scam">Defeating the Mustang GT500 Scam</h2><p class="paragraph" style="text-align:left;">Every good con has the same opening move: make the mark believe he’s too smart to be a mark. Our attorney walked straight into that psychological ambush. And here’s the uncomfortable truth—any of us could have done the same. The trick is learning to think like the spy setting the trap and like the spy hunter who tears it apart.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/4fa7f5b9-f99a-44af-89ed-998ade4408a6/0B096CF6-6415-4C4C-BD06-593919EF3690.png?t=1764885064"/></div><h3 class="heading" style="text-align:left;" id="think-like-a-spy-how-the-criminals-"><b>Think Like a Spy: How the Criminals Ran the Operation</b></h3><ol start="1"><li><p class="paragraph" style="text-align:left;">They built a convincing legend. Stolen dealership identity. Real VIN. Real photos. A fake business wrapped in a professional-looking website. A classic spy tactic: make the lie look effortless.</p></li><li><p class="paragraph" style="text-align:left;">They shaped the narrative through patience. Sixty emails, all polite and measured. No pressure. Criminals know that giving you time makes you believe you’re the one controlling the deal.</p></li><li><p class="paragraph" style="text-align:left;">They hid behind trusted institutions. Bank of America account. DocuSign. Clean documents. Add corporate polish and people stop questioning the fundamentals.</p></li><li><p class="paragraph" style="text-align:left;">They let emotion do the work. He wanted the Mustang. Badly. A good spy never fights desire—they redirect it.</p></li><li><p class="paragraph" style="text-align:left;">They collapsed the operation on their terms. Fake delivery delays, fake refund promises—the digital equivalent of a disappearing act.</p></li></ol><h3 class="heading" style="text-align:left;" id="act-like-a-spy-hunter-how-to-expose"><b>Act Like a Spy Hunter: How to Expose the Plot</b></h3><ol start="1"><li><p class="paragraph" style="text-align:left;">Verify independently, not through the seller. A single call to the real Orlando dealership—using a number he found himself—would have ended the illusion instantly.</p></li><li><p class="paragraph" style="text-align:left;">Check the infrastructure, not the story. A WHOIS lookup, a reverse image search, or even checking site age would have revealed the operation was new and suspiciously anonymous.</p></li><li><p class="paragraph" style="text-align:left;">Validate the bank details first. Banks can confirm whether an account belongs to a business. No address on a wire is a glaring warning light.</p></li><li><p class="paragraph" style="text-align:left;">Break the scammer’s script. Request a live FaceTime walk-around or a video showing the VIN and that day’s date. Fraudsters can fake documents, not real-time proof.</p></li><li><p class="paragraph" style="text-align:left;">Control the timing. Wire recalls must happen within 24 hours. Spy hunters assume anything involving money can go sideways—and plan accordingly.</p></li></ol><hr class="content_break"><h1 class="heading" style="text-align:left;" id="technology-news-of-the-week">Technology News of the Week</h1><p class="paragraph" style="text-align:left;"><b>The Corporate War for Hollywood</b></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/9e172c4b-60e3-405c-bfac-30c1f489089e/Gemini_Generated_Image_q0r3dnq0r3dnq0r3.png?t=1765285842"/></div><p class="paragraph" style="text-align:left;">Netflix thought it had locked down Warner Bros., HBO, and HBO Max with its tidy $82.7 billion deal. This is the kind of acquisition that would have made old-school studio bosses choke on their cigars. But before the ink dried, <a class="link" href="https://www.hollywoodreporter.com/business/business-news/paramount-launches-hostile-bid-for-warner-bros-1236444601/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=64-the-mustang-con-inside-a-perfect-online-car-scam" target="_blank" rel="noopener noreferrer nofollow">David Ellison and Paramount stormed the gates with a hostile $108.4 billion all-cash offer</a>, backed by sovereign wealth funds and the Ellison family fortune. In other words: real war-chest money.</p><p class="paragraph" style="text-align:left;">Now the question isn’t <i>whether</i> Warner Bros. gets bought. It’s <i>who conquers it</i>… and what survives afterward.</p><p class="paragraph" style="text-align:left;">If Netflix wins, the last great studio titan gets absorbed into a global streaming empire. This would drive the final nail into the coffin Hollywood’s been lying in since COVID pulverized the box office. Prestige franchises like <i>Harry Potter</i>, <i>Game of Thrones</i>, <i>The Sopranos</i>, <i>DC</i>, and the classics from <i>Casablanca</i> to <i>The Wizard of Oz</i> would bolster Netflix’s vault, with theatrical releases potentially becoming a quaint tradition rather than a business model.</p><p class="paragraph" style="text-align:left;">If Paramount wins, Hollywood gets a chance to breathe. Ellison promises more theaters, more movies, more traditional output — thirty-plus films a year — a kind of retro revival pitched as salvation for an industry that’s been sprinting toward the algorithm.</p><p class="paragraph" style="text-align:left;">Either way, someone is about to walk off with one of the greatest collections of stories ever assembled. The only real mystery left is whether the future of Hollywood plays out under bright theater lights… or in the glow of your living room.</p><p class="paragraph" style="text-align:left;">Because in this Corporate War for Hollywood, the real prize is who gets to shape what we watch next.</p><h1 class="heading" style="text-align:left;" id="get-the-book-spies-lies-and-cybercr">Get the Book: Spies, Lies, and Cybercrime</h1><p class="paragraph" style="text-align:left;">Thanks to all of you, my book, <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=64-the-mustang-con-inside-a-perfect-online-car-scam" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Spies, Lies, and Cybercrime</a></span>, is an <span style="text-decoration:underline;"><a class="link" href="https://www.usatoday.com/booklist/books/spies-lies-and-cybercrime-cybersecurity-tactics-to-outsmart-hackers-and-disarm-scammers/9780063398177/2025-10-15?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=64-the-mustang-con-inside-a-perfect-online-car-scam" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">instant national bestseller</a></span> and an Amazon #1 Bestseller.</p><p class="paragraph" style="text-align:left;">If you haven’t already, please buy <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=64-the-mustang-con-inside-a-perfect-online-car-scam" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">SPIES, LIES, AND CYBERCRIME</a></span>. If you already have, thank you, and please consider gifting some to friends and colleagues. It’s the perfect holiday gift!</p><p class="paragraph" style="text-align:left;"><span style="font-family:"Apple Color Emoji";">📺</span> Leave a 5-star review on <span style="text-decoration:underline;"><a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=64-the-mustang-con-inside-a-perfect-online-car-scam" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Amazon</a></span> or on <span style="text-decoration:underline;"><a class="link" href="https://www.goodreads.com/book/show/228909676-spies-lies-and-cybercrime?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=64-the-mustang-con-inside-a-perfect-online-car-scam" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Goodreads</a></span>.</p><p class="paragraph" style="text-align:left;">📖 Get a <span style="text-decoration:underline;"><a class="link" href="https://www.kensingtonrowbookshop.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=64-the-mustang-con-inside-a-perfect-online-car-scam" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">Signed copy</a></span>.</p><p class="paragraph" style="text-align:left;">🎤  I’m on the road doing speaking events. If your company or organization is interested in having me talk about the book, or you know of someone who is, <span style="text-decoration:underline;"><a class="link" href="https://ericoneill.net/contact/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=64-the-mustang-con-inside-a-perfect-online-car-scam" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(149, 79, 114)">book me to speak at your next event</a></span>.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/97050a4b-d329-450d-9ef5-628fb524ff25/IMG_7547.jpeg?t=1763392340"/></div><hr class="content_break"><h1 class="heading" style="text-align:left;" id="appearance-of-the-week">Appearance of the Week</h1><p class="paragraph" style="text-align:left;">In Episode 96 of the Cybersecurity Readiness Podcast, Eric O’Neill — former FBI ghost (undercover operative), renowned spyhunter, bestselling author, and the real-life inspiration behind the film Breach, takes us inside the high-stakes world of counterintelligence: how he helped expose Robert Hanssen, why spies and cybercriminals think alike, and how the tactics of the physical world now map directly onto digital deception, insider threats, and AI-powered social engineering at scale.</p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/BUSn7v3AYq4" width="100%"></iframe><hr class="content_break"><h1 class="heading" style="text-align:left;" id="ai-trend-of-the-week"><b>AI Trend of the Week</b></h1><p class="paragraph" style="text-align:left;">Following the Warner Bros. Studio story, this week’s AI trend of the week comes from <a class="link" href="https://www.instagram.com/esheffects/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=64-the-mustang-con-inside-a-perfect-online-car-scam" target="_blank" rel="noopener noreferrer nofollow">@esheffects</a> on Instagram who used AI to create a fever dream in their Superman/Supergirl Universe series.</p><p class="paragraph" style="text-align:left;">Who does it better? — Guys’ night out or girls’ night out?</p><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/fb699d9f-d265-4596-ad20-e38e7b606541/Screenshot_2025-12-06_at_8.32.04_AM.png?t=1765028199"/></div></td><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/949a5712-d6d9-4326-a661-aadd1ce55c57/Screenshot_2025-12-06_at_8.32.13_AM.png?t=1765028202"/></div></td></tr></table><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/0453bf96-e915-4c48-b498-89404b93e86a/Screenshot_2025-12-06_at_8.33.26_AM.png?t=1765028209"/></div></td><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/94f9b07a-5f96-42a4-a465-f2f1e692679f/Screenshot_2025-12-06_at_8.32.48_AM.png?t=1765028212"/></div></td></tr></table><hr class="content_break"><p class="paragraph" style="text-align:left;">Please give some love to our sponsor. It only takes a click. No purchase enecessary! </p><h3 class="heading" style="text-align:left;" id="the-hustle-claude-hacks-for-markete">The Hustle: Claude Hacks For Marketers</h3><div class="image"><a class="image__link" href="https://thehustle.co/the-hustle-how-to-use-claude-like-a-power-user-2?utm_medium=paid&utm_source=beehiiv&utm_campaign={{publication_alphanumeric_id}}&utm_term=Version-L&_bhiiv=opp_c221c619-54c6-42fb-b101-ad230c6d937c_feb846b7&bhcl_id=5b4e66b6-a41b-401e-9f4e-6ff63cb1597f_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/ec96f989-649b-4f78-8046-c65fd2b42683/2A_1920x1080.png?t=1763752507"/></a></div><p class="paragraph" style="text-align:left;">Some people use Claude to write emails. Others use it to basically run their entire business while they play Wordle.</p><p class="paragraph" style="text-align:left;">This isn&#39;t just ChatGPT&#39;s cooler cousin. It&#39;s the AI that&#39;s quietly revolutionizing how smart people work – writing entire business plans, planning marketing campaigns, and basically becoming the intern you never have to pay.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehustle.co/the-hustle-how-to-use-claude-like-a-power-user-2?utm_medium=paid&utm_source=beehiiv&utm_campaign={{publication_alphanumeric_id}}&utm_term=Version-L&_bhiiv=opp_c221c619-54c6-42fb-b101-ad230c6d937c_feb846b7&bhcl_id=5b4e66b6-a41b-401e-9f4e-6ff63cb1597f_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">The Hustle&#39;s</a> new guide shows you exactly how the AI-literate are leaving everyone else behind. Subscribe for instant access.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehustle.co/the-hustle-how-to-use-claude-like-a-power-user-2?utm_medium=paid&utm_source=beehiiv&utm_campaign={{publication_alphanumeric_id}}&utm_term=Version-L&_bhiiv=opp_c221c619-54c6-42fb-b101-ad230c6d937c_feb846b7&bhcl_id=5b4e66b6-a41b-401e-9f4e-6ff63cb1597f_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Get our Claude playbook</a></p><hr class="content_break"><h2 class="heading" style="text-align:left;" id="like-what-youre-reading"><b>Like What You&#39;re Reading?</b></h2><p class="paragraph" style="text-align:left;">Don’t miss a newsletter! <a class="link" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=64-the-mustang-con-inside-a-perfect-online-car-scam" target="_blank" rel="noopener noreferrer nofollow">Subscribe</a> to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=64-the-mustang-con-inside-a-perfect-online-car-scam"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><h2 class="heading" style="text-align:left;" id="continue-reading"><b>Continue Reading</b></h2><div class="embed"><a class="embed__url" href="https://spies-lies-cybercrime.ericoneill.net/p/no-blank-pages?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=64-the-mustang-con-inside-a-perfect-online-car-scam" target="_blank"><div class="embed__content"><p class="embed__title"> 63: No Blank Pages </p><p class="embed__description"> Spies, Lies & Cybercrime by Eric O&#39;Neill - Explore AI’s creative risks, this week’s top cyber scams, FBI alerts, and practical steps to protect yourself from digital threats. </p><p class="embed__link"> spies-lies-cybercrime.ericoneill.net/p/no-blank-pages </p></div><img class="embed__image embed__image--right" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/1298444e-8799-49c2-a667-0501fea3758e/Title_63.png?t=1764526141"/></a></div><div class="embed"><a class="embed__url" href="https://spies-lies-cybercrime.ericoneill.net/p/your-devices-are-listening?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=64-the-mustang-con-inside-a-perfect-online-car-scam" target="_blank"><div class="embed__content"><p class="embed__title"> 61: Your Devices Are Listening </p><p class="embed__description"> Spies, Lies & Cybercrime by Eric O&#39;Neill - Uncover the truth about device listening, sonic beacons, and digital tracking—plus the essential steps to lock down your privacy. </p><p class="embed__link"> spies-lies-cybercrime.ericoneill.net/p/your-devices-are-listening </p></div><img class="embed__image embed__image--right" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/cc74557c-1b30-457a-9a08-004e19f4262c/title_61.png?t=1763398025"/></a></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=b593208a-b8ea-454f-8f32-213378359cc4&utm_medium=post_rss&utm_source=spies_lies_cybercrime">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>63: No Blank Pages</title>
  <description>Spies, Lies &amp; Cybercrime by Eric O&#39;Neill</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/1298444e-8799-49c2-a667-0501fea3758e/Title_63.png" length="1404981" type="image/png"/>
  <link>https://spies-lies-cybercrime.ericoneill.net/p/no-blank-pages</link>
  <guid isPermaLink="true">https://spies-lies-cybercrime.ericoneill.net/p/no-blank-pages</guid>
  <pubDate>Tue, 02 Dec 2025 14:03:19 +0000</pubDate>
  <atom:published>2025-12-02T14:03:19Z</atom:published>
    <dc:creator>Eric ONeill</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b><a class="link" href="#title-story" rel="noopener noreferrer nofollow">Title Story: </a></b>A warning about how generative AI erodes creativity and why we must reclaim the struggle of the blank page to keep our minds sharp.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#cybersecurity-breach-of-the-week" rel="noopener noreferrer nofollow">Cybersecurity Breach of the Week: </a></b>A family movie night turns into a cautionary tale when a spoofed “Apple Support” call tricks a dad into handing over his iCloud credentials.</p><p class="paragraph" style="text-align:left;"><a class="link" href="#protect-yourself-starting-today" rel="noopener noreferrer nofollow">Protect Yourself: </a>A quick guide to PROTECT, your new hub for stopping scammers, locking down accounts, and beating the newest digital threats.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#cybersecurity-tip-of-the-week" rel="noopener noreferrer nofollow">Cybersecurity Tip of the Week:</a></b><a class="link" href="#cybersecurity-tip-of-the-week" rel="noopener noreferrer nofollow"> </a>The FBI alerts the public to a surge in criminals impersonating banks to steal accounts using spoofed calls, fake websites, and social engineering.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#appearance-of-the-week" rel="noopener noreferrer nofollow">Appearance of the Week:</a></b><a class="link" href="#appearance-of-the-week" rel="noopener noreferrer nofollow"> </a>A look at this week’s podcast appearance breaking down how insider threats evolve and how one spy nearly crippled national security.</p><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-trend-of-the-week" rel="noopener noreferrer nofollow">AI Trend Of the Week</a>: A playful AI-generated Marge Simpson describes the ultimate holiday gift for safeguarding your family.</p></div><p class="paragraph" style="text-align:left;">Enjoying the Newsletter? Do me a super quick favor. Please <a class="link" href="http://📺 Review the Book: https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/" target="_blank" rel="noopener noreferrer nofollow">jump on Amazon.com </a>and give my new book Spies, Lies, and Cybercrime a review.</p><h1 class="heading" style="text-align:left;" id="title-story">Title Story</h1><h2 class="heading" style="text-align:left;" id="no-blank-pages">No Blank Pages</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/616dd81b-c40f-4300-940b-67b574875fcb/title_63_full.png?t=1764526185"/></div><p class="paragraph" style="text-align:left;">On Thanksgiving, I <a class="link" href="https://spies-lies-cybercrime.ericoneill.net/p/happy-thanksgiving?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=63-no-blank-pages" target="_blank" rel="noopener noreferrer nofollow">challenged you</a> to turn your phones off for a full day. A clean break from the chatter. Who actually did it? If your hand just went up, good. If not, stay with me. That simple act of friction is the heart of what follows.</p><p class="paragraph" style="text-align:left;">For years, I’ve warned about a creeping danger dressed up as convenience. Generative AI writes your emails, drafts your essays, and spins out almost anything you ask for with lightning speed. Helpful on the surface. But convenience always hides a cost, and this one hits us at the foundation of what makes us creative.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://spies-lies-cybercrime.ericoneill.net/p/41-idiocracy-is-ai-making-humans-dumber?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=63-no-blank-pages" target="_blank" rel="noopener noreferrer nofollow">I’ve written about this in past issues</a>. Generative AI suffocates creativity. Real creativity begins in the panic of a blank page demanding something only you can give. You stare at it. You wrestle with it. Eventually your mind sparks, catches, burns, and suddenly the impossible becomes a paragraph. There’s a reason we authors talk about chasing the first sentence. It’s the first agonizing moment that activates everything else.</p><p class="paragraph" style="text-align:left;">When a machine hands you that first line instantly, your brain never strains. The mental weightlifting never happens. You shift from inventor to editor.</p><p class="paragraph" style="text-align:left;">So why do we keep turning to AI? because our magnificent minds are built for efficiency. They always have been. The wheel, the loom, the steam engine, the microchip. History is one long tale of humanity outsmarting work. GenAI is simply the newest and most seductive. Pair it with the endless drone of social media and you get a perfect storm. We’ve traded the quiet joy of a good book by the fire or a warm hammock in the backyard for hours of scrolling that leaves us empty.</p><p class="paragraph" style="text-align:left;">The real danger isn’t dystopian robots rising up with glowing eyes. The danger is that we stop rising up ourselves. In my upcoming book <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=63-no-blank-pages" target="_blank" rel="noopener noreferrer nofollow"><i>Spies, Lies, and Cybercrime</i></a>, I warn about a moment when there are no blank pages left. When every idea comes pre-formatted, spell-checked, smoothed out before it ever touches our minds. Without struggle, thought stagnates. Creativity pools in shallow corners instead of flowing like a river.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/64e35685-71c8-4302-a265-c313a138758a/girl_over_shoulder.png?t=1764531985"/></div><p class="paragraph" style="text-align:left;">Here&#39;s my new challenge:</p><p class="paragraph" style="text-align:left;">Pick up a notebook and write twenty minutes longhand. Feel the resistance. Read something challenging without letting a machine summarize it. Give yourself thirty minutes of quiet without a device.</p><p class="paragraph" style="text-align:left;">I’m not a luddite telling you to reject technology. I’m asking you to remind your brain that the spark is still there, waiting to fire if you let it work.</p><p class="paragraph" style="text-align:left;">If you shut your phone off on Thanksgiving, you’ve already had a taste of that clarity. If you didn’t, give yourself one day this week to try again.</p><p class="paragraph" style="text-align:left;">You may be surprised how loud your own mind becomes when you let it speak first.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="cybersecurity-breach-of-the-week">Cybersecurity Breach of the Week</h1><h2 class="heading" style="text-align:left;" id="the-apple-call-scam">The Apple Call Scam</h2><p class="paragraph" style="text-align:left;">The popcorn was already popped. The blankets were pulled tight. Pajamas on, lights low, and the family gathered for what had been promised all week: the new season of <i>Stranger Things</i>. Only one problem. Dad couldn’t get the Apple TV to open Netflix. The spinning wheel of doom mocked him from across the room. His daughter sighed. His son asked whether they could just “watch it on the iPad.” His wife gave him the look every spouse knows well: <i>just make it work.</i></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/ab9a6c90-0f6e-4dc7-bf38-a020a9caafbd/C8D774C3-1575-44E2-A647-3B06FEF6F821.png?t=1764526253"/></div><p class="paragraph" style="text-align:left;">Dad did what every frustrated parent eventually does. He reached for his phone to call Apple Support. And that’s when the phone rang. </p><p class="paragraph" style="text-align:left;">The caller ID said “Apple Support.” The logo was right there. The number was correct. It felt like divine intervention. He answered immediately.</p><p class="paragraph" style="text-align:left;">A calm, professional voice told him there had been suspicious activity in his iCloud account. There might have been a breach. His Apple TV issues, the representative explained, were likely connected. They needed to “verify” his account to fix the problem. Just his Apple ID and password. Maybe a verification code or two.</p><p class="paragraph" style="text-align:left;">Dad didn’t hesitate. The family was waiting under warm blankets, and Netflix stood between him and mutiny. So he handed the scammer the keys to his digital life.</p><p class="paragraph" style="text-align:left;">The truth, of course, was far darker. Caller-ID spoofing made the fake call appear authentic, right down to the logo and the official number. And once he gave up his credentials, the scammers walked straight into his iCloud account.</p><p class="paragraph" style="text-align:left;">Apple later confirmed what cybersecurity pros have been warning for months: unsolicited calls—no matter how real they look—are traps. Apple will never ask for your password or verification codes. If a call comes in that you didn’t request yourself, the safest move is to hang up.</p><p class="paragraph" style="text-align:left;">Dad eventually got Netflix working. But not before losing control of the one account that holds everything from photos to backups to the digital breadcrumbs of his entire life. The family got their show. The scammer got the breach of the week.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="protect-yourself-starting-today">Protect Yourself—Starting Today</h1><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/4a8dca3c-9cfb-48e5-9d33-3708392c9c88/FC3FCF46-2AFD-4E26-BAFF-333B3ED3AE5F.png?t=1764527472"/><div class="image__source"><span class="image__source_text"><p>Get your Protect Seal today!</p></span></div></div><p class="paragraph" style="text-align:left;">My new hub, <b>PROTECT</b>, is now live at <a class="link" href="http://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=63-no-blank-pages" target="_blank" rel="noopener noreferrer nofollow">ericoneill.net/protect</a> and it’s built for anyone who wants to stop cybercriminal scammers cold. It’s fast, practical, and drawn straight from the playbook I used hunting spies for the FBI.</p><p class="paragraph" style="text-align:left;">Inside, you’ll get the exact steps to take the moment your accounts are compromised, how to lock them down before criminals get in, and how to spot the scams hitting elders, teens, and anyone with a pulse and a Wi-Fi signal. There’s even a crash course on beating deepfakes—because they’re cheap, everywhere, and entirely too convincing.</p><p class="paragraph" style="text-align:left;">If you want the full battle manual, that’s in <i>Spies, Lies and Cybercrime</i>.</p><p class="paragraph" style="text-align:left;">If you want to start protecting yourself right now? <b>Begin here: </b><b><a class="link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=63-no-blank-pages" target="_blank" rel="noopener noreferrer nofollow">ericoneill.net/protect</a></b></p><p class="paragraph" style="text-align:left;">Now—on to this week’s tip.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="cybersecurity-tip-of-the-week">Cybersecurity Tip of the Week </h1><h2 class="heading" style="text-align:left;" id="fbi-warning-stop-account-takeover-s">FBI Warning: Stop Account Takeover Scams</h2><p class="paragraph" style="text-align:left;">This week’s threat: a fast-growing Account Takeover scam the <a class="link" href="https://www.ic3.gov/PSA/2025/PSA251125?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=63-no-blank-pages" target="_blank" rel="noopener noreferrer nofollow">FBI is sounding the alarm on</a>.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/af882512-c2eb-4590-a03d-f323e92f9d89/Screenshot_2025-11-30_at_1.37.39_PM.png?t=1764527873"/></div><p class="paragraph" style="text-align:left;">Cybercriminals are impersonating banks and credit unions through texts, emails, fake websites, and even spoofed phone numbers that look legitimate. Their goal is simple: trick you into handing over login credentials or one-time passcodes. Once they have those, they reset your password, lock you out, and empty your accounts—often laundering the money through crypto wallets before you even notice the balance changed.</p><p class="paragraph" style="text-align:left;">Some scammers go further, posing as law enforcement and claiming your information was used to buy firearms or commit fraud. It’s all theater designed to rattle you into compliance.</p><p class="paragraph" style="text-align:left;"><b>Act Like a Spy Hunter.</b></p><p class="paragraph" style="text-align:left;">✔️Never share passcodes with anyone. Real institutions will not ask.</p><p class="paragraph" style="text-align:left;">✔️Use bookmarks for financial sites and avoid clicking links in search results or emails.</p><p class="paragraph" style="text-align:left;">✔️Always verify unexpected calls by hanging up and dialing the official number yourself.</p><p class="paragraph" style="text-align:left;">✔️Watch your accounts for missing deposits or strange withdrawals.</p><p class="paragraph" style="text-align:left;">✔️Use strong, unique passwords and keep multi-factor authentication turned on.</p><p class="paragraph" style="text-align:left;">Want weekly spy-level tips? <b>Subscribe to this newsletter</b> and dig deeper at <b><a class="link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=63-no-blank-pages" target="_blank" rel="noopener noreferrer nofollow">ericoneill.net/protect</a></b>.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://spies-lies-cybercrime.ericoneill.net/subscribe?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=63-no-blank-pages"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><hr class="content_break"><h1 class="heading" style="text-align:left;" id="get-the-book-spies-lies-and-cybercr">Get the Book: Spies, Lies, and Cybercrime</h1><p class="paragraph" style="text-align:left;">Thanks to all of you, my book, <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=63-no-blank-pages" target="_blank" rel="noopener noreferrer nofollow">Spies, Lies, and Cybercrime</a>, is an <a class="link" href="https://www.usatoday.com/booklist/books/spies-lies-and-cybercrime-cybersecurity-tactics-to-outsmart-hackers-and-disarm-scammers/9780063398177/2025-10-15?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=63-no-blank-pages" target="_blank" rel="noopener noreferrer nofollow">instant national bestseller</a> and an <a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=63-no-blank-pages" target="_blank" rel="noopener noreferrer nofollow">Amazon #1 Bestseller</a>.</p><p class="paragraph" style="text-align:left;">If you haven’t already, please buy <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=63-no-blank-pages#order" target="_blank" rel="noopener noreferrer nofollow">SPIES, LIES, AND CYBERCRIME</a>. If you already have, <i><b>thank you</b></i>, and please consider gifting some to friends and colleagues. It’s the perfect holiday gift! </p><p class="paragraph" style="text-align:left;">📺 Leave a 5-star review on <a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=63-no-blank-pages" target="_blank" rel="noopener noreferrer nofollow">Amazon</a> or on <a class="link" href="https://www.goodreads.com/book/show/228909676-spies-lies-and-cybercrime?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=63-no-blank-pages" target="_blank" rel="noopener noreferrer nofollow">Goodreads</a>.</p><p class="paragraph" style="text-align:left;">📖 Get a <a class="link" href="https://www.kensingtonrowbookshop.com?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=63-no-blank-pages" target="_blank" rel="noopener noreferrer nofollow">Signed copy</a>.</p><p class="paragraph" style="text-align:left;">🎤  I’m on the road doing speaking events. If your company or organization is interested in having me talk about the book, or you know of someone who is, <a class="link" href="https://ericoneill.net/contact/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=63-no-blank-pages" target="_blank" rel="noopener noreferrer nofollow">book me to speak at your next event.</a></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/97050a4b-d329-450d-9ef5-628fb524ff25/IMG_7547.jpeg?t=1763392340"/></div><hr class="content_break"><h1 class="heading" style="text-align:left;" id="appearance-of-the-week">Appearance of the Week</h1><p class="paragraph" style="text-align:left;">I stopped by the Cyber Crime Junkies podcast last week to pull back the curtain on my years as an FBI ghost. We dug into the real story behind catching Robert Hanssen, one of the most destructive spies this country has ever seen, and traced how betrayal in the shadows has evolved into the modern world of cybercrime.</p><p class="paragraph" style="text-align:left;">If you want to understand the insider threats that can bypass even the strongest defenses, and how a single compromised trust can trigger a catastrophic breach, watch below. This is the side of cybersecurity most people never see… but absolutely need to.</p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/Y7iweJmEAZs" width="100%"></iframe><hr class="content_break"><h1 class="heading" style="text-align:left;" id="ai-trend-of-the-week"><b>AI Trend of the Week</b></h1><p class="paragraph" style="text-align:left;">Marge Simpson gives some advice for the best holiday gift to keep your family safe from Spies, Lies and Cybercrime.</p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/ej4vAj8-bK4" width="100%"></iframe><hr class="content_break"><p class="paragraph" style="text-align:left;">Please give some love to our sponsors. One click is all it takes. No purchase necessary.</p><h3 class="heading" style="text-align:left;">200+ AI Side Hustles to Start Right Now</h3><div class="image"><a class="image__link" href="https://thehustle.co/the-hustle-ai-powered-income-ideas-2?utm_medium=paid&utm_source=beehiiv&utm_campaign={{publication_alphanumeric_id}}&utm_term=Version-D&_bhiiv=opp_54017626-405c-4c64-8f98-0d6b36636bfa_36b389da&bhcl_id=03616331-32a8-4588-8d9c-b40d4b53672f_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="border-radius:0px 0px 0px 0px;border-style:solid;border-width:0px 0px 0px 0px;box-sizing:border-box;border-color:#E5E7EB;" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/96ea79ea-7b6a-4f38-a209-108aa1fd7349/Offer_4_4A_3.png?t=1745627844"/></a></div><p class="paragraph" style="text-align:left;">AI isn&#39;t just changing business—it&#39;s creating entirely new income opportunities. <a class="link" href="https://thehustle.co/the-hustle-ai-powered-income-ideas-2?utm_medium=paid&utm_source=beehiiv&utm_campaign={{publication_alphanumeric_id}}&utm_term=Version-D&_bhiiv=opp_54017626-405c-4c64-8f98-0d6b36636bfa_36b389da&bhcl_id=03616331-32a8-4588-8d9c-b40d4b53672f_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">The Hustle&#39;s</a> guide features 200+ ways to make money with AI, from beginner-friendly gigs to advanced ventures. Each comes with realistic income projections and resource requirements. Join 1.5M professionals getting daily insights on emerging tech and business opportunities.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehustle.co/the-hustle-ai-powered-income-ideas-2?utm_medium=paid&utm_source=beehiiv&utm_campaign={{publication_alphanumeric_id}}&utm_term=Version-D&_bhiiv=opp_54017626-405c-4c64-8f98-0d6b36636bfa_36b389da&bhcl_id=03616331-32a8-4588-8d9c-b40d4b53672f_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Get the guide</a></p><hr class="content_break"><h3 class="heading" style="text-align:left;" id="like-what-youre-reading"><b>Like What You&#39;re Reading?</b></h3><p class="paragraph" style="text-align:left;">Don’t miss a newsletter! <a class="link" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=63-no-blank-pages" target="_blank" rel="noopener noreferrer nofollow">Subscribe</a> to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=63-no-blank-pages"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><h2 class="heading" style="text-align:left;" id="lets-make-sure-my-emails-land-strai"><b>Let&#39;s make sure my emails land straight in your inbox.</b></h2><p class="paragraph" style="text-align:left;"><b>Gmail users: </b>Move this email to your primary inbox</p><p class="paragraph" style="text-align:left;"><b>On your phone? </b>Hit the 3 dots at top right corner, click &quot;Move to&quot; then &quot;Primary.&quot;</p><p class="paragraph" style="text-align:left;"><b>On desktop?</b> Close this email then drag and drop this email into the &quot;Primary&quot; tab near the top left of your screen</p><p class="paragraph" style="text-align:left;"><b>Apple mail users: </b>Tap on our email address at the top of this email (next to &quot;From:&quot; on mobile) and click “Add to VIPs”<br><br><b>For everyone else: </b><a class="link" href="https://blog.beehiiv.com/p/safelist-newsletter-senders-popular-email-services?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=63-no-blank-pages" target="_blank" rel="noopener noreferrer nofollow">follow these instructions</a></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=89161f85-0494-4523-a4c1-e2f735e0928c&utm_medium=post_rss&utm_source=spies_lies_cybercrime">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>62: Happy Thanksgiving</title>
  <description>Spies, Lies &amp; Cybercrime by Eric O&#39;Neill</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/02558754-5bb0-4072-bb7b-c12cb27e4de5/62_title.png" length="1534577" type="image/png"/>
  <link>https://spies-lies-cybercrime.ericoneill.net/p/happy-thanksgiving</link>
  <guid isPermaLink="true">https://spies-lies-cybercrime.ericoneill.net/p/happy-thanksgiving</guid>
  <pubDate>Tue, 25 Nov 2025 14:03:12 +0000</pubDate>
  <atom:published>2025-11-25T14:03:12Z</atom:published>
    <dc:creator>Eric ONeill</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b><a class="link" href="#title-story" rel="noopener noreferrer nofollow">Title Story: </a></b>This holiday season, hide the phones! A personal challenge to reclaim Thanksgiving by ditching devices and rediscovering real human connection.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#cybersecurity-tip-of-the-week" rel="noopener noreferrer nofollow">Cybersecurity Tip of the Week:</a></b><a class="link" href="#cybersecurity-tip-of-the-week" rel="noopener noreferrer nofollow"> </a>Protect Yourself! A quick guide to your new PROTECT resource and why everyone should start hardening their defenses today ahead of the holiday crime wave.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#cybersecurity-breach-of-the-week" rel="noopener noreferrer nofollow">Cybersecurity Breach of the Week: </a></b>A look at how a single supply-chain breach crippled a global automaker and why no organization is safe from weak links.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#appearance-of-the-week" rel="noopener noreferrer nofollow">Appearance of the Week:</a></b><a class="link" href="#appearance-of-the-week" rel="noopener noreferrer nofollow"> </a>I join CBS News to discuss expectations around the Epstein file release.</p><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-trend-of-the-week" rel="noopener noreferrer nofollow">AI Trend Of the Week</a>: A lighthearted look at viral AI-generated political recreations offering comic relief during the holiday travel rush.</p></div><h1 class="heading" style="text-align:left;" id="title-story">Title Story</h1><h2 class="heading" style="text-align:left;" id="happy-thanksgiving">Happy Thanksgiving!</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/69f62ecc-7719-4e65-b180-381e75d91b07/Thanksgiving_without_phones.png?t=1764001709"/><div class="image__source"><span class="image__source_text"><p>The Dr. Seuss version of my family. This holiday season, hide the phones!</p></span></div></div><p class="paragraph" style="text-align:left;">Thanksgiving has always meant something different to me. After years undercover in the pressure cooker of FBI counterintelligence and counterterrorism—where holidays were more of a scheduling obstacle than a celebration—then stepping into an international law firm where the hours were just as long but the threats wore nicer suits, and later building businesses, writing books, and speaking on stages around the world, I learned something important: holidays aren’t a luxury. They’re sacrosanct.</p><p class="paragraph" style="text-align:left;">Thanksgiving sits at the top of the list for me. Yes, it’s a uniquely American holiday, but it’s long outgrown its origin story. It’s become a moment of intentional humanity—an excuse, if we need one, to gather with the people we love, share a good meal, and remember that life is bigger than deadlines, inboxes, and the next crisis.</p><p class="paragraph" style="text-align:left;">But here’s the uncomfortable truth: we’re losing the ability to be present for any of it.</p><p class="paragraph" style="text-align:left;">We live in a technology-first world now. The instant we feel bored, lonely, or even mildly inconvenienced, we reach for the glowing rectangle in our pocket. We scroll. We tap. We refresh. We consume. It’s instinctive, compulsive, and slowly devouring the parts of us that make life meaningful. Creativity is evaporating. Our attention spans are shrinking. And our capacity for genuine connection is on life support.</p><p class="paragraph" style="text-align:left;">How often has someone walked past you in your own home with headphones on, so deep into a podcast or playlist they don’t offer—not even a nod—just a silent drift through the room like a ghost? When was the last time you sat in a car, looked out the window, and let your mind wander? When was the last time you daydreamed without a device interrupting you every eight seconds?</p><p class="paragraph" style="text-align:left;">And the real gut punch: how much time have you lost to your screen just this week?</p><p class="paragraph" style="text-align:left;">If you had it back—every minute spent doomscrolling, every micro-hit of digital dopamine—what would you do with it? You might laugh more. You might cook more. You might sit with the people you love and actually talk. You might even rediscover what it feels like to be bored, which is the birthplace of imagination.</p><p class="paragraph" style="text-align:left;">Stanford researchers recently looked at what happens when people take a real break from social media—a full six weeks offline. The results weren’t shocking, but they were damning. People slept better. They were less anxious. They felt more connected. They were happier. More human. All from stepping away from the endless feed.</p><p class="paragraph" style="text-align:left;">Which brings me to a challenge for this Thanksgiving.</p><p class="paragraph" style="text-align:left;">Put down the phone. All day.</p><p class="paragraph" style="text-align:left;">Not forever. Not for a month. Just for one holiday.</p><p class="paragraph" style="text-align:left;">Let the world spin without you for a few hours. Trust me, it will. Hit the kitchen. Tell the stories you’ve told a hundred times. Ask your parents or grandparents the questions you’ve been meaning to ask. Be a friend to the people you love. Sit with your kids and actually listen. Go outside. Touch grass. Watch the sky. Let your brain idle long enough to remember it’s capable of something other than reacting to a notification.</p><p class="paragraph" style="text-align:left;">Because here’s the truth I’ve learned the hard way: a hug or a laugh from someone who matters—one real moment of connection—is worth more than a thousand likes on your best post or any high score on Block Blast.</p><p class="paragraph" style="text-align:left;">This Thanksgiving, reclaim one day from the machines. Give it back to yourself, and to the people waiting right in front of you.</p><p class="paragraph" style="text-align:left;">You won’t miss the screen. But I promise—you’ll remember the day.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="cybersecurity-tip-of-the-week">Cybersecurity Tip of the Week </h1><h2 class="heading" style="text-align:left;" id="protect-yourself"><span style="color:#0720f4;">Protect Yourself!</span></h2><p class="paragraph" style="text-align:left;">Before you dive into this week’s tip, I’ve got something new for you—something I built because cybercriminals are evolving faster than most people can keep up.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/9c390b3d-ba5e-4432-a6e1-47669d85aa32/Screenshot_2025-11-24_at_11.23.36_AM.png?t=1764001438"/><div class="image__source"><a class="image__source_link" href="https://www.ericoneill.net/protect.?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=62-happy-thanksgiving" rel="noopener" target="_blank"><span class="image__source_text"><p>PROTECT is now live at <a class="link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=62-happy-thanksgiving" target="_blank" rel="noopener noreferrer nofollow">ericoneill.net/protect</a>.</p></span></a></div></div><p class="paragraph" style="text-align:left;"><b>PROTECT</b> is now live at <b><a class="link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=62-happy-thanksgiving" target="_blank" rel="noopener noreferrer nofollow">ericoneill.net/protect</a></b>.</p><p class="paragraph" style="text-align:left;">It’s your starting point for defending yourself, your family, and your business from scams, fraud, deepfakes, account takeovers, and every modern trick the bad guys use. I designed it to be practical, fast, and battle-tested—pulled straight from my years hunting spies for the FBI.</p><p class="paragraph" style="text-align:left;">You’ll find clear guidance on what to do <b>the moment you’re compromised</b>, how to lock down your accounts before criminals drain them, and how to recognize the scams targeting elders, teens, and anyone who spends more than three minutes a day online.</p><p class="paragraph" style="text-align:left;">And because deepfakes are now cheap, convincing, and everywhere, I included a section dedicated to spotting and avoiding them before they cost you real money.</p><p class="paragraph" style="text-align:left;">If you want the full battlefield manual, it’s in my new book <i>Spies, Lies and Cybercrime</i>. But if you want to start protecting yourself today?</p><p class="paragraph" style="text-align:left;">Start here: <b><a class="link" href="https://ericoneill.net/protect?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=62-happy-thanksgiving" target="_blank" rel="noopener noreferrer nofollow">ericoneill.net/protect</a></b></p><p class="paragraph" style="text-align:left;">Now—on to this week’s tip.</p><h2 class="heading" style="text-align:left;" id="surviving-black-friday-without-gett">Surviving Black Friday Without Getting Scammed</h2><p class="paragraph" style="text-align:left;">The holiday shopping season is a minefield, and the criminals know you’re distracted, rushed, and riding a gravy-induced high. Their entire playbook relies on three psychological triggers: urgency (“Act now!”), emotion (fear, excitement, guilt), and benefit (“Save a fortune!”). If they can hijack your instincts, they win.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/b06a099e-b3e2-41f2-92d9-81d0fc24b41f/dont_get_scammed.png?t=1764003570"/></div><p class="paragraph" style="text-align:left;">Here are the top threats hitting right now:</p><p class="paragraph" style="text-align:left;"><b>1. AI Imposters:</b> Criminals clone a family member’s voice or video and claim they’re in trouble. Always call back on a known number and confirm with a family code word.</p><p class="paragraph" style="text-align:left;"><b>2. Smishing Texts:</b> Fake package delays, bogus account alerts. Don’t tap the link. Go directly to the retailer or shipper’s website.</p><p class="paragraph" style="text-align:left;"><b>3. Fake Deals & Phony Stores:</b> If the discount looks supernatural, it probably is. Shop directly on the retailer’s official site and use a credit card.</p><p class="paragraph" style="text-align:left;"><b>4. Fake Charities:</b> Emotional appeals designed to rush you. Only donate through the charity’s verified website.</p><p class="paragraph" style="text-align:left;"><b>Your defense is simple:</b></p><ul><li><p class="paragraph" style="text-align:left;">Avoid deals, calls, texts and social media messages that push urgency. Take a breath and think before acting.</p></li><li><p class="paragraph" style="text-align:left;">Turn on multifactor authentication.</p></li><li><p class="paragraph" style="text-align:left;">Don’t click unsolicited links.</p></li><li><p class="paragraph" style="text-align:left;">Use credit cards—not wires or crypto.</p></li><li><p class="paragraph" style="text-align:left;">And trust your instincts. If it feels off, it is.</p></li></ul><p class="paragraph" style="text-align:left;">Stay sharp, shop smart, and don’t let scammers steal your holiday cheer.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="cybersecurity-breach-of-the-week">Cybersecurity Breach of the Week</h1><h2 class="heading" style="text-align:left;" id="jaguar-land-rovers-196-million-warn">Jaguar Land Rover’s £196 Million Warning Shot</h2><p class="paragraph" style="text-align:left;">Jaguar Land Rover just delivered one of the clearest lessons of the year in how devastating a single supply-chain attack can be. This fall, the automaker was blindsided when a cyberattack hit one of its key suppliers—one weak link in a global chain. Plants shut down. Workers were sent home. Production lines froze. By the end of the quarter, <a class="link" href="https://cybermagazine.com/news/jlr-cyber-breach-financial-disaster?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=62-happy-thanksgiving" target="_blank" rel="noopener noreferrer nofollow">JLR reported more than £196 million</a><a class="link" href="https://cybermagazine.com/news/jlr-cyber-breach-financial-disaster?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=62-happy-thanksgiving" target="_blank" rel="noopener noreferrer nofollow"><b> </b></a><a class="link" href="https://cybermagazine.com/news/jlr-cyber-breach-financial-disaster?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=62-happy-thanksgiving" target="_blank" rel="noopener noreferrer nofollow">in losses</a> (over $220 million) turning what should have been a profitable period into a financial crater. The situation grew so severe the UK government had to step in with a £1.5 billion loan guarantee just to stabilize operations.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/56e8c9b9-e550-4dc0-979a-3c97fc747e76/CF78D53C-5B37-4CCD-9660-399A37EE1D1F.png?t=1764004228"/></div><p class="paragraph" style="text-align:left;">This is the new reality: you can spend millions defending your own network, but if a partner, vendor, or supplier leaves a door unlocked, attackers don’t need to breach you directly. They just slip in through the weakest point and let the dominoes fall. It’s exactly why supply-chain attacks have become the weapon of choice for cybercriminals and nation-state spies. With one well-placed hit, they can force chaos across an entire industry.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="get-the-book-spies-lies-and-cybercr">Get the Book: Spies, Lies, and Cybercrime</h1><p class="paragraph" style="text-align:left;">Thanks to all of you, my book, <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=62-happy-thanksgiving" target="_blank" rel="noopener noreferrer nofollow">Spies, Lies, and Cybercrime</a>, is an <a class="link" href="https://www.usatoday.com/booklist/books/spies-lies-and-cybercrime-cybersecurity-tactics-to-outsmart-hackers-and-disarm-scammers/9780063398177/2025-10-15?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=62-happy-thanksgiving" target="_blank" rel="noopener noreferrer nofollow">instant national bestseller</a> and an <a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=62-happy-thanksgiving" target="_blank" rel="noopener noreferrer nofollow">Amazon #1 Bestseller</a>.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/480b6f6d-a674-42f2-a7b0-8c9200195463/buy_the_book.png?t=1764005912"/></div><p class="paragraph" style="text-align:left;">If you haven’t already, please buy <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=62-happy-thanksgiving#order" target="_blank" rel="noopener noreferrer nofollow">SPIES, LIES, AND CYBERCRIME</a>. If you already have, <i><b>thank you</b></i>, and please consider gifting some to friends and colleagues. It makes a perfect holiday gift for anyone you want to protect from cyber scams. </p><p class="paragraph" style="text-align:left;">Please share! Forward this email to your friends and family. Here&#39;s an easy-to-post <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=62-happy-thanksgiving" target="_blank" rel="noopener noreferrer nofollow">cover graphic</a>, here&#39;s a <a class="link" href="https://www.linkedin.com/pulse/spies-lies-cybercrime-five-lessons-from-book-eric-o-neill-l6l3e/?trackingId=A1cDw4nCjJmOs87%2B4v2ZFA%3D%3D&utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=62-happy-thanksgiving" target="_blank" rel="noopener noreferrer nofollow">Linkedin post</a>, here&#39;s an <a class="link" href="https://www.instagram.com/reel/DPuhA8ckqMB/?utm_source=ig_web_copy_link&igsh=MzRlODBiNWFlZA==" target="_blank" rel="noopener noreferrer nofollow">IG reel </a>and a <a class="link" href="https://www.instagram.com/p/DOos4ptgW_2/?utm_source=ig_web_copy_link&igsh=MzRlODBiNWFlZA==" target="_blank" rel="noopener noreferrer nofollow">post</a>.</p><p class="paragraph" style="text-align:left;">📚 Get the book: <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=62-happy-thanksgiving" target="_blank" rel="noopener noreferrer nofollow">https://ericoneill.net/books/spies_and_lies/</a></p><p class="paragraph" style="text-align:left;">📺 Review the Book: <a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=62-happy-thanksgiving" target="_blank" rel="noopener noreferrer nofollow">https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/</a></p><p class="paragraph" style="text-align:left;">📖 Get a Signed copy: <a class="link" href="https://www.kensingtonrowbookshop.com?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=62-happy-thanksgiving" target="_blank" rel="noopener noreferrer nofollow">https://www.kensingtonrowbookshop.com</a></p><p class="paragraph" style="text-align:left;">🎤 Book me to speak at your next event: <a class="link" href="https://www.bigspeak.com/speakers/eric-oneill?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=62-happy-thanksgiving" target="_blank" rel="noopener noreferrer nofollow">https://www.bigspeak.com/speakers/eric-oneill</a></p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="appearance-of-the-week">Appearance of the Week</h1><p class="paragraph" style="text-align:left;">I join Major Garrett on CBS Evening News on &quot;The Takeout&quot; to discuss exceptions to the order to release the Epstein files. Unfortunately, we all need to manage expectations about the Epstein files release.</p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/OEFEZPqJ3RY" width="100%"></iframe><hr class="content_break"><h1 class="heading" style="text-align:left;" id="ai-trend-of-the-week"><b>AI Trend of the Week</b></h1><p class="paragraph" style="text-align:left;">If you are worried about travel during the Thanksgiving holiday, the great team at Diaper Diplomacy has a brilliant AI recreation of President Trump’s press conference about our air traffic system. This AI recreation is exceptional, funny and the best way to turn often contentious politics light-hearted.</p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/ZD-wyJgaPj0" width="100%"></iframe><p class="paragraph" style="text-align:left;">Because we are nonpartisan here at Spies, Lies & Cybercrime, here’s one from everyone’s favorite independent congressman.</p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/5BRGvAgohQs" width="100%"></iframe><hr class="content_break"><p class="paragraph" style="text-align:left;">Please give our advertisers a click to show them love and help out the newsletter. </p><h3 class="heading" style="text-align:left;" id="realtime-user-onboarding-zero-engin">Realtime User Onboarding, Zero Engineering</h3><div class="image"><a class="image__link" href="https://www.quarterzip.ai/?utm_source=beehiv&utm_medium=paid&utm_campaign={{publication_alphanumeric_id}}&utm_term=v1-p-cta&_bhiiv=opp_ed7a8036-980a-4691-9305-a4cfe89bc054_e6e4e925&bhcl_id=c94c7312-0782-4e51-b9ed-d2482041310d_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/35e52d14-202a-4a3c-a15e-2b520a0e9f10/Verison_A1_-_primary.png?t=1759888685"/></a></div><p class="paragraph" style="text-align:left;">Quarterzip delivers realtime, AI-led onboarding for every user with zero engineering effort.</p><p class="paragraph" style="text-align:left;">✨ <a class="link" href="https://www.quarterzip.ai/?utm_source=beehiv&utm_medium=paid&utm_campaign={{publication_alphanumeric_id}}&utm_term=v1-p-cta&_bhiiv=opp_ed7a8036-980a-4691-9305-a4cfe89bc054_e6e4e925&bhcl_id=c94c7312-0782-4e51-b9ed-d2482041310d_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Dynamic Voice</a> guides users in the moment<br>✨ <a class="link" href="https://www.quarterzip.ai/?utm_source=beehiv&utm_medium=paid&utm_campaign={{publication_alphanumeric_id}}&utm_term=v1-p-cta&_bhiiv=opp_ed7a8036-980a-4691-9305-a4cfe89bc054_e6e4e925&bhcl_id=c94c7312-0782-4e51-b9ed-d2482041310d_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Picture-in-Picture</a> stay visible across your site and others<br>✨ Guardrails keep things accurate with smooth handoffs if needed</p><p class="paragraph" style="text-align:left;">No code. No engineering. Just onboarding that adapts as you grow.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.quarterzip.ai/?utm_source=beehiv&utm_medium=paid&utm_campaign={{publication_alphanumeric_id}}&utm_term=v1-p-cta&_bhiiv=opp_ed7a8036-980a-4691-9305-a4cfe89bc054_e6e4e925&bhcl_id=c94c7312-0782-4e51-b9ed-d2482041310d_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">See how it works</a></p><hr class="content_break"><h3 class="heading" style="text-align:left;" id="like-what-youre-reading"><b>Like What You&#39;re Reading?</b></h3><p class="paragraph" style="text-align:left;">Don’t miss a newsletter! <a class="link" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=62-happy-thanksgiving" target="_blank" rel="noopener noreferrer nofollow">Subscribe</a> to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=62-happy-thanksgiving"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><h2 class="heading" style="text-align:left;" id="lets-make-sure-my-emails-land-strai"><b>Let&#39;s make sure my emails land straight in your inbox.</b></h2><p class="paragraph" style="text-align:left;"><b>Gmail users: </b>Move this email to your primary inbox</p><p class="paragraph" style="text-align:left;"><b>On your phone? </b>Hit the 3 dots at top right corner, click &quot;Move to&quot; then &quot;Primary.&quot;</p><p class="paragraph" style="text-align:left;"><b>On desktop?</b> Close this email then drag and drop this email into the &quot;Primary&quot; tab near the top left of your screen</p><p class="paragraph" style="text-align:left;"><b>Apple mail users: </b>Tap on our email address at the top of this email (next to &quot;From:&quot; on mobile) and click “Add to VIPs”<br><br><b>For everyone else: </b><a class="link" href="https://blog.beehiiv.com/p/safelist-newsletter-senders-popular-email-services?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=62-happy-thanksgiving" target="_blank" rel="noopener noreferrer nofollow">follow these instructions</a></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=bbc4804f-5bed-4749-bc3a-c52a54007845&utm_medium=post_rss&utm_source=spies_lies_cybercrime">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>61: Your Devices Are Listening</title>
  <description>Spies, Lies &amp; Cybercrime by Eric O&#39;Neill</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/cc74557c-1b30-457a-9a08-004e19f4262c/title_61.png" length="1250892" type="image/png"/>
  <link>https://spies-lies-cybercrime.ericoneill.net/p/your-devices-are-listening</link>
  <guid isPermaLink="true">https://spies-lies-cybercrime.ericoneill.net/p/your-devices-are-listening</guid>
  <pubDate>Tue, 18 Nov 2025 14:03:53 +0000</pubDate>
  <atom:published>2025-11-18T14:03:53Z</atom:published>
    <dc:creator>Eric ONeill</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b><a class="link" href="#title-story" rel="noopener noreferrer nofollow">Title Story: </a></b>How your devices listen, what they capture, and the simple steps that keep your conversations out of the algorithm’s ears.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#cybersecurity-tip-of-the-week" rel="noopener noreferrer nofollow">Cybersecurity Tip of the Week:</a></b><a class="link" href="#cybersecurity-tip-of-the-week" rel="noopener noreferrer nofollow"> </a>A 60-second microphone lockdown that shuts down silent tracking on your phone, browser, and smart speakers.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#cybersecurity-breach-of-the-week" rel="noopener noreferrer nofollow">Cybersecurity Breach of the Week: </a></b>North Korea’s phantom IT workforce infiltrates U.S. companies using stolen identities, AI, and remote-work blind spots.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#appearance-of-the-week" rel="noopener noreferrer nofollow">Appearance of the Week:</a></b><a class="link" href="#appearance-of-the-week" rel="noopener noreferrer nofollow"> </a>I joined host David Puner on the Cyberark Podcast to take a deep dive into the mindset and tactics needed to defend against today’s sophisticated cyber threats.</p><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-trend-of-the-week" rel="noopener noreferrer nofollow">AI Trend Of the Week</a>: I have to admit enjoying the newest AI tend that remixes iconic songs into a 1950s Motown Soul AI Cover. I share my favorite below. </p></div><h1 class="heading" style="text-align:left;" id="title-story">Title Story</h1><h1 class="heading" style="text-align:left;" id="is-your-phone-listening-to-you">Is Your Phone Listening to You?</h1><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/cc74557c-1b30-457a-9a08-004e19f4262c/title_61.png?t=1763398025"/></div><p class="paragraph" style="text-align:left;">I spent years hunting spies—people who lived in the shadows and listened for a living. They were deliberate, patient, and skilled. Today, we’ve built devices that do the same thing, only faster, cheaper, and with better battery life.</p><p class="paragraph" style="text-align:left;">We’ve all had the same experience: say the word “vacation” near your phone and suddenly Instagram thinks you’re dying to snorkel with turtles in Maui. Mention a weird product near your Alexa—dog wheelchairs, artisanal lawn gnomes—and, like magic, the ads appear on your Amazon feed. It feels like espionage. And in a way, it is.</p><p class="paragraph" style="text-align:left;">Let’s start with the truth: <b>your devices are listening</b>. Not in the Hollywood sense where a bored tech analyst monitors your breakfast conversations. Instead, your phone, Alexa, Google Home, and even apps you barely remember downloading constantly scan for what they call wake words. “Alexa.” “Hey Google.” “Siri.” These systems monitor audio streams in real time, using AI to detect when they should pay attention. That means the microphone is open. Always.</p><p class="paragraph" style="text-align:left;"><b>Companies have spent real money perfecting this.</b></p><p class="paragraph" style="text-align:left;">Amazon received patent number <a class="link" href="https://patents.google.com/patent/US8798995B1?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening" target="_blank" rel="noopener noreferrer nofollow">US8798995B1</a> for a “voice-sniffing algorithm” that detects keywords in ambient conversation and <a class="link" href="https://patents.google.com/patent/US10096319B1?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening" target="_blank" rel="noopener noreferrer nofollow">US10096319B1</a> that uses voice input to infer physical and emotional traits (e.g., sore throat, sickness, excited vs. sad mood). Google patented <a class="link" href="https://patents.google.com/patent/US8138930B1?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening" target="_blank" rel="noopener noreferrer nofollow">US8138930B1</a>, a system to analyze background audio to target ads and <a class="link" href="https://patents.google.com/patent/US20220246140A1?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening" target="_blank" rel="noopener noreferrer nofollow">US 2022/0246140 A1</a> that keeps a device in a continuous listening state to detect not only fixed but context-specific wake words. Facebook holds a patent (<a class="link" href="https://patents.google.com/patent/US10075767B2?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening" target="_blank" rel="noopener noreferrer nofollow">US 10,075,767</a>) for technology that lets your phone record ambient audio during TV shows and ads, match it to hidden ultrasonic signals, and determine what you’re watching for ad targeting.</p><p class="paragraph" style="text-align:left;"><b>And then came the whistleblowers.</b></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bloomberg.com/news/articles/2019-04-10/is-anyone-listening-to-you-on-alexa-a-global-team-reviews-audio?embedded-checkout=true&utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening" target="_blank" rel="noopener noreferrer nofollow">Bloomberg</a>, <a class="link" href="https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening" target="_blank" rel="noopener noreferrer nofollow">The Guardian</a>, <a class="link" href="https://www.businessinsider.com/amazon-apple-google-microsoft-assistants-sent-audio-contractors-2019-8?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening" target="_blank" rel="noopener noreferrer nofollow">Business Insider</a>, and others reported that Amazon, Apple, and Google all used human contractors to review snippets of audio captured from their devices. Apple eventually suspended the program after public backlash. The recordings were supposed to activate only after wake words. They didn’t. Contractors allegedly heard fights, intimate moments, private medical issues. In the intelligence world, this is what we call “collateral collection”—the stuff you weren’t aiming for but scooped up anyway.</p><p class="paragraph" style="text-align:left;">Then there’s a lesser-known trick: sonic beacons. These are high-frequency audio signals, inaudible to humans, that your phone can hear. Some apps use them to track whether your device has been near a specific TV commercial, store speaker system, or even another app. You’ll never know they were triggered. But your ad feed will.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/0bd1f66d-ebab-440d-bad4-15087cce4286/B49F0723-4630-471E-97EB-1A964D9F100C.png?t=1763396499"/></div><p class="paragraph" style="text-align:left;">And yes, apps absolutely use AI to scan for spoken keywords. You talk about “flights,” “deals,” “kayaks,” “back pain,” or “new boots,” and within hours, your digital world nudges you toward a purchase. Surveillance, not magic.</p><p class="paragraph" style="text-align:left;">In 2018, a Northeastern University study tried to confirm whether phones secretly recorded audio without permission. They found no hard evidence of true “covert eavesdropping,” but they did find thousands of instances of apps sending screenshots, screen recordings, location data, and usage behavior without the user knowing. </p><p class="paragraph" style="text-align:left;"><b>Run your own countermeasures.</b></p><p class="paragraph" style="text-align:left;">The 48-Hour Test: Pick a bizarre product you’ve never searched for. Say it aloud near your phone 10–15 times over two days. Don’t type it. Don’t search it. Just talk about it. Then see what pops up in your ads. Plenty of people have done this and watched the results roll in like clockwork.</p><p class="paragraph" style="text-align:left;">So is your phone listening? Let’s put it this way: if an FBI operative behaved the way your apps do, we’d call it surveillance. And you gave them permission.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="cybersecurity-tip-of-the-week">Cybersecurity Tip of the Week </h1><h2 class="heading" style="text-align:left;" id="think-like-a-spy-your-60-second-mic">THINK LIKE A SPY: Your 60-Second Microphone Lockdown</h2><p class="paragraph" style="text-align:left;">During my years running Ghost surveillance operations for the FBI, I learned that If there’s a microphone in the room, assume someone can turn it against you. Here’s how you protect yourself.</p><p id="i-phone" class="paragraph" style="text-align:left;"><b>iPhone</b></p><ul><li><p class="paragraph" style="text-align:left;"><b>Settings → Privacy & Security → Microphone</b></p><p class="paragraph" style="text-align:left;">Kill access for Facebook, Instagram, TikTok, shopping apps, and any app that doesn’t need your voice.</p></li><li><p class="paragraph" style="text-align:left;"><b>App Privacy Report</b></p><p class="paragraph" style="text-align:left;">Turn it on. Check who’s touching your mic.</p></li><li><p class="paragraph" style="text-align:left;"><b>Siri</b></p><p class="paragraph" style="text-align:left;">If you don’t use hands-free, disable “Listen for ‘Hey Siri.’”</p></li></ul><p id="android" class="paragraph" style="text-align:left;"><b>Android</b></p><ul><li><p class="paragraph" style="text-align:left;"><b>Settings → Privacy → Permission Manager → Microphone</b></p><p class="paragraph" style="text-align:left;">Revoke mic rights from anything nonessential.</p></li><li><p class="paragraph" style="text-align:left;">Use the <b>global mic kill switch</b> in Quick Settings when you want real silence.</p></li></ul><p id="browsers" class="paragraph" style="text-align:left;"><b>Browsers</b></p><ul><li><p class="paragraph" style="text-align:left;"><b>Chrome / Firefox / Edge → Site Settings → Microphone</b></p><p class="paragraph" style="text-align:left;">Default to <b>Block</b>. Clear any “Allowed” sites.</p></li></ul><p id="smart-speakers" class="paragraph" style="text-align:left;"><b>Smart Speakers</b></p><ul><li><p class="paragraph" style="text-align:left;">Use the <b>physical mute button</b> when the discussion isn’t for public consumption.</p></li><li><p class="paragraph" style="text-align:left;">Review and delete <b>voice history</b> in the Alexa or Google Home app.</p></li></ul><p class="paragraph" style="text-align:left;">Locking down your microphones makes you harder to profile, harder to track, and a far less predictable data point. In my old line of work, that’s how you stay alive.</p><p class="paragraph" style="text-align:left;">In your digital life, it’s how you stay private.</p><hr class="content_break"><p class="paragraph" style="text-align:center;">Don’t miss a newsletter! <a class="link" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening" target="_blank" rel="noopener noreferrer nofollow">Subscribe</a> to Spies, Lies & Cybercrime.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><h1 class="heading" style="text-align:left;" id="cybersecurity-breach-of-the-week">Cybersecurity Breach of the Week</h1><h2 class="heading" style="text-align:left;" id="subtitle">North Korea’s Remote-Work Infiltration</h2><p class="paragraph" style="text-align:left;">North Korea has refined a new form of espionage: <i>remote imposters</i>. This week, the <a class="link" href="https://www.justice.gov/opa/pr/justice-department-announces-nationwide-actions-combat-illicit-north-korean-government?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening" target="_blank" rel="noopener noreferrer nofollow">DOJ announced guilty pleas</a> from five people who helped North Korean operatives infiltrate 136 U.S. companies by posing as ordinary IT workers. The facilitators supplied clean identities—some stolen, some real—and even hosted company-issued laptops in their homes so it appeared the workers lived inside the United States.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/465cea66-e9f7-4624-bef2-936aee0ab848/Screenshot_2025-01-25_at_2.39.56_PM.png?t=1763397189"/></div><p class="paragraph" style="text-align:left;">Once inside, the imposters performed just enough work to stay credible. In many cases, they used AI tools to complete tasks, allowing them to remain embedded longer while they quietly siphoned data, stole secrets, and collected U.S. paychecks. The scheme generated $2.2 million for the regime.</p><p class="paragraph" style="text-align:left;">One participant was an active-duty Army service-member. Another ran a fake staffing company specializing in “certified” remote IT talent. A Ukrainian accomplice stole and sold U.S. identities to North Korean operatives, who used them to secure jobs at more than 40 firms.</p><p class="paragraph" style="text-align:left;">In a world built on remote work, the weakest link might be your hiring pipeline. The fix isn’t complicated: strong background checks, real identity verification, and a second look at anyone who seems “too perfect” on paper.</p><p class="paragraph" style="text-align:left;">A little diligence can stop a spy in sheep’s clothing.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="get-the-book-spies-lies-and-cybercr">Get the Book: Spies, Lies, and Cybercrime</h1><p class="paragraph" style="text-align:left;">Thanks to all of you, my book, <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening" target="_blank" rel="noopener noreferrer nofollow">Spies, Lies, and Cybercrime</a>, is an <a class="link" href="https://www.usatoday.com/booklist/books/spies-lies-and-cybercrime-cybersecurity-tactics-to-outsmart-hackers-and-disarm-scammers/9780063398177/2025-10-15?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening" target="_blank" rel="noopener noreferrer nofollow">instant national bestseller</a> and an <a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening" target="_blank" rel="noopener noreferrer nofollow">Amazon #1 Bestseller</a>.</p><p class="paragraph" style="text-align:left;">If you haven’t already, please buy <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening#order" target="_blank" rel="noopener noreferrer nofollow">SPIES, LIES, AND CYBERCRIME</a>. If you already have, <i><b>thank you</b></i>, and please consider gifting some to friends and colleagues. It makes a perfect holiday gift for anyone you want to protect from cyber scams. </p><p class="paragraph" style="text-align:left;">Please share! Forward this email to your friends and family. Here&#39;s an easy-to-post <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening" target="_blank" rel="noopener noreferrer nofollow">cover graphic</a>, here&#39;s a <a class="link" href="https://www.linkedin.com/pulse/spies-lies-cybercrime-five-lessons-from-book-eric-o-neill-l6l3e/?trackingId=A1cDw4nCjJmOs87%2B4v2ZFA%3D%3D&utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening" target="_blank" rel="noopener noreferrer nofollow">Linkedin post</a>, here&#39;s an <a class="link" href="https://www.instagram.com/reel/DPuhA8ckqMB/?utm_source=ig_web_copy_link&igsh=MzRlODBiNWFlZA==" target="_blank" rel="noopener noreferrer nofollow">IG reel </a>and a <a class="link" href="https://www.instagram.com/p/DOos4ptgW_2/?utm_source=ig_web_copy_link&igsh=MzRlODBiNWFlZA==" target="_blank" rel="noopener noreferrer nofollow">post</a>.</p><p class="paragraph" style="text-align:left;">📚 Get the book: <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening" target="_blank" rel="noopener noreferrer nofollow">https://ericoneill.net/books/spies_and_lies/</a></p><p class="paragraph" style="text-align:left;">📺 Review the Book: <a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening" target="_blank" rel="noopener noreferrer nofollow">https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/</a></p><p class="paragraph" style="text-align:left;">📖 Get a Signed copy: <a class="link" href="https://www.kensingtonrowbookshop.com?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening" target="_blank" rel="noopener noreferrer nofollow">https://www.kensingtonrowbookshop.com</a></p><p class="paragraph" style="text-align:left;">🎤 Book me to speak at your next event: <a class="link" href="https://www.bigspeak.com/speakers/eric-oneill?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening" target="_blank" rel="noopener noreferrer nofollow">https://www.bigspeak.com/speakers/eric-oneill</a></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/97050a4b-d329-450d-9ef5-628fb524ff25/IMG_7547.jpeg?t=1763392340"/></div><hr class="content_break"><h1 class="heading" style="text-align:left;" id="appearance-of-the-week">Appearance of the Week</h1><p class="paragraph" style="text-align:left;">I joined host David Puner on the Cyberark Podcast to take a deep dive into the mindset and tactics needed to defend against today’s sophisticated cyber threats. We discussed how thinking like an attacker can help organizations and individuals stay ahead. The episode covers actionable frameworks, real-world stories, and practical advice for building cyber resilience in an age of AI-driven scams and industrialized ransomware.</p><div class="embed"><a class="embed__url" href="https://www.cyberark.com/podcasts/ep-19-trust-under-attack-spies-lies-and-the-new-face-of-cybercrime/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening" target="_blank"><div class="embed__content"><p class="embed__title"> EP 19 - Trust under attack: Spies, lies, and the new face of cybercrime </p><p class="embed__description"> Eric O’Neill, former FBI ghost and author of “Spies, Lies & Cybercrime,” joins host David Puner to take a deep dive into the mindset and tactics needed to defend against today’s sophisticated cyber threats. Drawing... </p><p class="embed__link"> www.cyberark.com/podcasts/ep-19-trust-under-attack-spies-lies-and-the-new-face-of-cybercrime </p></div><img class="embed__image embed__image--right" src="https://www.cyberark.com/wp-content/uploads/2025/11/N2E0NS5qcGc.jpg"/></a></div><hr class="content_break"><h1 class="heading" style="text-align:left;" id="ai-trend-of-the-week"><b>AI Trend of the Week</b></h1><p class="paragraph" style="text-align:left;">I have to admit enjoying the newest AI tend that remixes iconic songs into a 1950s Motown Soul AI Cover. This remix of Eminem’s <i>Without Me</i> has got to be my favorite. And while you’re at it, join me over on <a class="link" href="https://www.instagram.com/ericoneill.official/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening" target="_blank" rel="noopener noreferrer nofollow">Instagram</a>. </p><blockquote align="center" class="instagram-media"><a href="https://www.instagram.com/reel/DQZ5MlIDHBb/?igsh=cnM5c2ZzeGJtaDM0&utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening"><p dir="ltr" lang="en"> Instagram post </p></a></blockquote><hr class="content_break"><p class="paragraph" style="text-align:left;">Please support our sponsors by clicking below and giving them a look. </p><h3 class="heading" style="text-align:left;" id="realtime-user-onboarding-zero-engin">Realtime User Onboarding, Zero Engineering</h3><div class="image"><a class="image__link" href="https://www.quarterzip.ai/?utm_source=beehiv&utm_medium=paid&utm_campaign={{publication_alphanumeric_id}}&utm_term=v1-p-cta&_bhiiv=opp_b9b1a9fb-8d56-47ab-8608-9a85a807af2e_e6e4e925&bhcl_id=24065238-10f9-4d72-a344-e2535365e5af_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/35e52d14-202a-4a3c-a15e-2b520a0e9f10/Verison_A1_-_primary.png?t=1759888685"/></a></div><p class="paragraph" style="text-align:left;">Quarterzip delivers realtime, AI-led onboarding for every user with zero engineering effort.</p><p class="paragraph" style="text-align:left;">✨ <a class="link" href="https://www.quarterzip.ai/?utm_source=beehiv&utm_medium=paid&utm_campaign={{publication_alphanumeric_id}}&utm_term=v1-p-cta&_bhiiv=opp_b9b1a9fb-8d56-47ab-8608-9a85a807af2e_e6e4e925&bhcl_id=24065238-10f9-4d72-a344-e2535365e5af_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Dynamic Voice</a> guides users in the moment<br>✨ <a class="link" href="https://www.quarterzip.ai/?utm_source=beehiv&utm_medium=paid&utm_campaign={{publication_alphanumeric_id}}&utm_term=v1-p-cta&_bhiiv=opp_b9b1a9fb-8d56-47ab-8608-9a85a807af2e_e6e4e925&bhcl_id=24065238-10f9-4d72-a344-e2535365e5af_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Picture-in-Picture</a> stay visible across your site and others<br>✨ Guardrails keep things accurate with smooth handoffs if needed</p><p class="paragraph" style="text-align:left;">No code. No engineering. Just onboarding that adapts as you grow.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.quarterzip.ai/?utm_source=beehiv&utm_medium=paid&utm_campaign={{publication_alphanumeric_id}}&utm_term=v1-p-cta&_bhiiv=opp_b9b1a9fb-8d56-47ab-8608-9a85a807af2e_e6e4e925&bhcl_id=24065238-10f9-4d72-a344-e2535365e5af_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">See how it works</a></p><hr class="content_break"><h3 class="heading" style="text-align:left;" id="like-what-youre-reading"><b>Like What You&#39;re Reading?</b></h3><p class="paragraph" style="text-align:left;">Don’t miss a newsletter! <a class="link" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening" target="_blank" rel="noopener noreferrer nofollow">Subscribe</a> to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><h2 class="heading" style="text-align:left;" id="lets-make-sure-my-emails-land-strai"><b>Let&#39;s make sure my emails land straight in your inbox.</b></h2><p class="paragraph" style="text-align:left;"><b>Gmail users: </b>Move this email to your primary inbox</p><p class="paragraph" style="text-align:left;"><b>On your phone? </b>Hit the 3 dots at top right corner, click &quot;Move to&quot; then &quot;Primary.&quot;</p><p class="paragraph" style="text-align:left;"><b>On desktop?</b> Close this email then drag and drop this email into the &quot;Primary&quot; tab near the top left of your screen</p><p class="paragraph" style="text-align:left;"><b>Apple mail users: </b>Tap on our email address at the top of this email (next to &quot;From:&quot; on mobile) and click “Add to VIPs”<br><br><b>For everyone else: </b><a class="link" href="https://blog.beehiiv.com/p/safelist-newsletter-senders-popular-email-services?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=61-your-devices-are-listening" target="_blank" rel="noopener noreferrer nofollow">follow these instructions</a></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=0c06e431-5434-4a38-94c8-ddb31801124a&utm_medium=post_rss&utm_source=spies_lies_cybercrime">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>60: Ghosts of Technology Past</title>
  <description>Spies, Lies &amp; Cybercrime by Eric O&#39;Neill</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/fc46aa8c-8c5e-4dc4-b004-c542824e573d/past.jpg" length="610850" type="image/jpeg"/>
  <link>https://spies-lies-cybercrime.ericoneill.net/p/ghosts-of-technology-past</link>
  <guid isPermaLink="true">https://spies-lies-cybercrime.ericoneill.net/p/ghosts-of-technology-past</guid>
  <pubDate>Tue, 11 Nov 2025 14:01:20 +0000</pubDate>
  <atom:published>2025-11-11T14:01:20Z</atom:published>
    <dc:creator>Eric ONeill</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b><a class="link" href="#title-story" rel="noopener noreferrer nofollow">Title Story: </a></b>The Ghosts of Our Gadgets: A nostalgic look back at the tech that defined a generation—when rewinding tapes, fixing rabbit ears, and pressing play felt like magic. </p><p class="paragraph" style="text-align:left;"><a class="link" href="#technologies-that-will-disappear-by" rel="noopener noreferrer nofollow">Technologies That Will Disappear by 2030:</a> As the future accelerates, familiar tools fade — passwords, cash, cables, and even the TV channel itself.</p><p class="paragraph" style="text-align:left;"><a class="link" href="#order-the-book-the-launched-the-new" rel="noopener noreferrer nofollow">Order the Book that Launched the Newsletter: </a>Discover the true stories behind Spies, Lies & Cybercrime — where espionage meets the digital age.</p><p class="paragraph" style="text-align:left;"><a class="link" href="#cybersecurity-tip-of-the-week" rel="noopener noreferrer nofollow">Cybersecurity Tip of the Week: </a>Holiday scams are here — learn how to shop smart and stay one click ahead of the criminals.</p><p class="paragraph" style="text-align:left;"><a class="link" href="#appearances-of-the-week" rel="noopener noreferrer nofollow">Appearances of the Week: </a>Catch the latest interviews and media highlights from the Spies, Lies & Cybercrime book tour.</p></div><h1 class="heading" style="text-align:left;" id="honoring-our-united-states-veterans">Honoring Our United States Veterans Today</h1><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/2dedc62f-4bd1-4cad-950e-c5f96eab25c4/DB958BB7-A8EF-487A-9946-ACF1C33A05D6.png?t=1762867450"/></div><p class="paragraph" style="text-align:left;">I never served in the U.S. military, though I was supposed to. Instead, I served by joining the FBI and defending the country from within. My father served in the Navy on submarines. His father was a gunnery officer. My mother’s father served in the Army. I have uncles, brothers, cousins, and extended family who have worn the uniform, and an O’Neill has fought in every U.S. war since the Civil War.</p><p class="paragraph" style="text-align:left;">Today, I honor them all — and every man and woman who has served. Here’s hoping the federal government honors them too… preferably by paying them!</p><p class="paragraph" style="text-align:left;">Veterans Day is the perfect time to support a group that supports veterans. One I have supported for years is run by my friends TJ and Peggylee Wright in Huntsville, Alabama. <a class="link" href="https://huntsvillesofnetwork.org/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=60-ghosts-of-technology-past" target="_blank" rel="noopener noreferrer nofollow">The Huntsville SOF Network</a>. Check them out. Now on to the Newsletter!</p><h2 class="heading" style="text-align:left;" id="saying-goodbye-to-the-futures-past">Saying Goodbye to the Future’s Past</h2><p class="paragraph" style="text-align:left;">For the past two weeks, we’ve been deep in the weeds of progress—how technology changes faster than we can say “update required.” Last week, we looked ahead to what’s coming. This week, we’re looking back—at what’s leaving.</p><p class="paragraph" style="text-align:left;">The march of innovation doesn’t just build new things; it quietly buries the old ones. By 2030, many of today’s everyday tools will join the fax machine, floppy disk, and Blockbuster membership card in the great tech graveyard. So, pour one out for the analog comforts of the past—then get ready to delete them from your life.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="title-story">Title Story</h1><h2 class="heading" style="text-align:left;" id="the-ghosts-of-our-gadgets">The Ghosts of Our Gadgets</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/3ff17c3d-f7db-48ae-94d9-418f9883de23/guantlet.png?t=1761944915"/></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Summers on the beach were simpler when I was a kid. My dad would pull out his Betamax video camera—roughly the size and weight of a bazooka—and aim it at my brothers and me running into the surf. We’d wave, dive, and laugh, completely unaware he was filming our childhood on a format already losing the war to VHS.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">We built soundtracks for our lives one song at a time, fingers hovering over the record button on the boombox, praying the DJ wouldn’t talk over the intro. Rolls of quarters vanished into arcade machines like </span><span style="font-family:Helvetica;"><i>Gauntlet</i></span><span style="font-family:Helvetica;">, where “Elf has stolen the food (again)” became the first harsh lesson in teamwork.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">We memorized the planets—nine of them, thank you very much—until some distant committee decided Pluto was expendable. We jogged with Walkmans, then Discmans, running smoothly so the CD didn’t skip. We were human antennas, holding rabbit ears to keep the TV picture clear just long enough for Cal Ripken to hit one out of the park.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">And when the day was done, we rushed home from school for </span><span style="font-family:Helvetica;"><i>G.I. Joe</i></span><span style="font-family:Helvetica;">, then stayed up late for </span><span style="font-family:Helvetica;"><i>Knight Rider </i></span><span style="font-family:Helvetica;">and </span><span style="font-family:Helvetica;"><i>Fantasy Island</i></span><span style="font-family:Helvetica;">.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">These moments, these relics, are fading into digital dust. But they built us—a generation that grew up between the analog and the algorithm. We didn’t just watch technology change; we lived through its awkward adolescence. And maybe that’s why we appreciate it differently. We remember what it felt like to press play.</span></p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="technologies-that-will-disappear-by">Technologies That Will Disappear by 2030</h1><div class="image"><img alt="" class="image__image" style="border-radius:0px 0px 0px 0px;border-style:solid;border-width:0px 0px 0px 0px;box-sizing:border-box;border-color:#E5E7EB;" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/7b659459-8597-409c-a7f1-ef3a3de10684/old_tech.png?t=1761924760"/></div><h2 class="heading" style="text-align:left;" id="the-everyday-relics-well-soon-leave">The everyday relics we’ll soon leave behind</h2><h3 class="heading" style="text-align:left;" id="passwords"><span style="font-family:Helvetica;"><b>Passwords</b></span></h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Passkeys and biometrics are ending the era of memorized credentials. </span>🔗<span style="font-family:Helvetica;"> </span><span style="color:blue;"><b><a class="link" href="https://www.theverge.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=60-ghosts-of-technology-past" target="_blank" rel="noopener noreferrer nofollow">Learn more — The Verge: The End of Passwords</a></b></span></p><h3 class="heading" style="text-align:left;" id="physical-credit-cards"><span style="font-family:Helvetica;"><b>Physical credit cards</b></span></h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Contactless and wearable payments already dominate; some banks now issue virtual-only cards. </span>🔗<span style="font-family:Helvetica;"> </span><span style="color:blue;"><b><a class="link" href="https://www.reuters.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=60-ghosts-of-technology-past" target="_blank" rel="noopener noreferrer nofollow">Learn more — Reuters: Banks Phase Out Plastic Cards</a></b></span></p><h3 class="heading" style="text-align:left;" id="remote-controls"><span style="font-family:Helvetica;"><b>Remote controls</b></span></h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Voice, motion, and AI context make pressing buttons obsolete—your home already knows what you want. </span>🔗<span style="font-family:Helvetica;"> </span><span style="color:blue;"><b><a class="link" href="https://www.cnet.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=60-ghosts-of-technology-past" target="_blank" rel="noopener noreferrer nofollow">Learn more — CNET: The Smart Home Without Remotes</a></b></span></p><h3 class="heading" style="text-align:left;" id="cables"><span style="font-family:Helvetica;"><b>Cables</b></span></h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Wireless charging and ultra-wideband data transfer are freeing us from tangled cords for good. </span>🔗<span style="font-family:Helvetica;"> </span><span style="color:blue;"><b><a class="link" href="https://spectrum.ieee.org/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=60-ghosts-of-technology-past" target="_blank" rel="noopener noreferrer nofollow">Learn more — IEEE Spectrum: The Cable-Free Future</a></b></span></p><h3 class="heading" style="text-align:left;" id="traditional-keys"><span style="font-family:Helvetica;"><b>Traditional keys</b></span></h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Smart locks and facial recognition are replacing metal keys with mobile credentials. </span>🔗<span style="font-family:Helvetica;"> </span><span style="color:blue;"><b><a class="link" href="https://www.wired.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=60-ghosts-of-technology-past" target="_blank" rel="noopener noreferrer nofollow">Learn more — Wired: The Death of the Door Key</a></b></span></p><h3 class="heading" style="text-align:left;" id="paper-receipts"><span style="font-family:Helvetica;"><b>Paper receipts</b></span></h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Digital invoices and NFC billing are phasing out printed slips—some cities now make them “opt-in” only. </span>🔗<span style="font-family:Helvetica;"> </span><span style="color:blue;"><b><a class="link" href="https://www.bloomberg.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=60-ghosts-of-technology-past" target="_blank" rel="noopener noreferrer nofollow">Learn more — Bloomberg: The Last Paper Receipt</a></b></span></p><h3 class="heading" style="text-align:left;" id="television-channels"><span style="font-family:Helvetica;"><b>Television channels</b></span></h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Streaming has killed the channel; AI-curated feeds now deliver personalized programming on demand. </span>🔗<span style="font-family:Helvetica;"> </span><span style="color:blue;"><b><a class="link" href="https://variety.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=60-ghosts-of-technology-past" target="_blank" rel="noopener noreferrer nofollow">Learn more — Variety: The Fall of Linear TV</a></b></span></p><h3 class="heading" style="text-align:left;" id="cash"><span style="font-family:Helvetica;"><b>Cash</b></span></h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Physical money is below 10% of transactions in most economies; digital currencies are next. </span>🔗<span style="font-family:Helvetica;"> </span><span style="color:blue;"><b><a class="link" href="https://www.bbc.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=60-ghosts-of-technology-past" target="_blank" rel="noopener noreferrer nofollow">Learn more — BBC: The Slow Death of Cash</a></b></span></p><hr class="content_break"><p class="paragraph" style="text-align:left;"><b>Like What You&#39;re Reading?</b></p><p class="paragraph" style="text-align:left;">Don’t miss a newsletter! <a class="link" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=60-ghosts-of-technology-past" target="_blank" rel="noopener noreferrer nofollow">Subscribe</a> to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=60-ghosts-of-technology-past"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><hr class="content_break"><h1 class="heading" style="text-align:left;" id="top-10-useless-things-from-growing-">Top 10 Useless Things from Growing Up Gen-X</h1><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/68625371-c0bc-4a26-8a1c-69cfaa76d006/Gen_X.png?t=1761943699"/></div><p id="we-grew-up-rewinding-tapes-with-pen" class="paragraph" style="text-align:left;">We grew up rewinding tapes with pencils, blowing dust out of Nintendo cartridges, and memorizing phone numbers like it was a survival skill. Now, most of what once felt essential wouldn’t last a day in the 2030s. Here’s a look back at the relics Gen-X perfected, and the future has politely deleted.</p><p id="1-pluto-was-a-planet" class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><b>1. Pluto was a planet</b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">We memorized nine planets, made dioramas, and then—poof—science demoted our tiny frozen friend. Turns out even space isn’t safe from layoffs.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><b>2. The Dewey Decimal System</b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">We spent hours deciphering decimals to find books; now you just type “AI” and get an existential crisis on Google.</span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/8c2dd684-e371-4443-9cf2-5f64c5e9704f/CC0D8DB8-F611-4CA4-84AF-8E541EEFEAE7.png?t=1762713897"/></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><b>3. The food pyramid</b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Apparently, carbs aren’t a food group after all. Who knew that an entire childhood of white bread was a bad idea?</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><b>4. Microfiche</b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Nothing said “cutting-edge research” like squinting into a glowing box at blurry newspaper scans. Now, it’s all in your pocket.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><b>5. Learning to type on a typewriter</b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">You hit a wrong key, and it was permanent—no backspace, just shame. Now autocorrect saves us from our own thumbs.</span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/0848e545-d70c-4780-95ba-0cc65db1cc46/6FAD4554-A3A5-4EBF-A151-3E7F60D5D2A5.png?t=1762714821"/></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><b>6. Writing cursive</b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">We were told it was a vital life skill. Turns out, no one’s written a check or love letter in cursive since 1999. </span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><b>7. Writing checks</b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Standing in line while someone balanced their checkbook was a national pastime. Venmo killed that—and thank God.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><b>8. Your math teacher: “You won’t always have a calculator!”</b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">We now have a calculator, GPS, and the sum of human knowledge in our pockets—and still use it mostly for memes.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><b>9. Learning to drive a manual transmission</b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">It built character and calf muscles, but good luck finding a car—or a hill—that still cares. On a side note, my family recently visited Germany, land of manual transmission cars. I made certain that my brother-in-law taught my teenagers how to drive stick…to a great deal of creative cursing in Deutsch! </span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;"><b>10. Mixtape + VHS tape + CD collections</b></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">When I was a child my grandfather’s hobby was taping the Sunday TV matinee over onto VHS tapes. My brother and I would watch all the Universal monster classics on his grand TV, ignoring the jumps where grandpa was a bit slow on the pause button to skip the commercial. His hundreds of tapes, meticulously labeled and stored disappeared shortly after he passed away, a legacy no descendant wanted to curate. Like my grandpa, we spent hours recording the perfect playlist or taping over “MacGyver.” Now everything lives in the cloud, except the nostalgia.</span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/654b135d-0255-4d9d-9ae6-b90babbf5907/4B5D32AA-0207-4AF0-A6A0-549258A68C34.png?t=1762714193"/></div><p class="paragraph" style="text-align:left;">We grew up in an analog world, where the hum of a VHS rewind or the click of a typewriter meant progress. Those sounds have faded, replaced by silent swipes and invisible clouds that somehow hold our lives. As we say goodbye to the tools that shaped us, we can’t help but wonder if the future will ever feel as tangible—or as human—as the world we left behind.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="order-the-book-the-launched-the-new">Order the Book the Launched the Newsletter</h1><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/3ad871ea-372e-4a24-8ce1-1f393a2f0ee7/14DDF795-0201-4AEE-8C2A-A825A38F5266.jpg?t=1760735371"/></div><p class="paragraph" style="text-align:left;">I hope you love the book as much as I loved writing it for you! Please leave a review. Great reviews help others find the book. </p><p class="paragraph" style="text-align:left;">📚 Get the book: <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=60-ghosts-of-technology-past" target="_blank" rel="noopener noreferrer nofollow">https://ericoneill.net/books/spies_and_lies/</a></p><p class="paragraph" style="text-align:left;">📺 Please review the Book. Reviews are the secret weapon that triggers Amazon’s algorithm to share the book with thousands of new readers who might not otherwise find it — and might otherwise fall prey to an attack. <a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=60-ghosts-of-technology-past" target="_blank" rel="noopener noreferrer nofollow">https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/</a></p><p class="paragraph" style="text-align:left;"> 🙏 Please share! Forward this email to your friends and family. Here&#39;s an easy-to-post <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=60-ghosts-of-technology-past" target="_blank" rel="noopener noreferrer nofollow">cover graphic</a>, here&#39;s a <a class="link" href="https://www.linkedin.com/pulse/spies-lies-cybercrime-five-lessons-from-book-eric-o-neill-l6l3e/?trackingId=A1cDw4nCjJmOs87%2B4v2ZFA%3D%3D&utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=60-ghosts-of-technology-past" target="_blank" rel="noopener noreferrer nofollow">Linkedin post</a>, here&#39;s an <a class="link" href="https://www.instagram.com/reel/DPuhA8ckqMB/?utm_source=ig_web_copy_link&igsh=MzRlODBiNWFlZA==" target="_blank" rel="noopener noreferrer nofollow">IG reel </a>and a <a class="link" href="https://www.instagram.com/p/DOos4ptgW_2/?utm_source=ig_web_copy_link&igsh=MzRlODBiNWFlZA==" target="_blank" rel="noopener noreferrer nofollow">post</a>.</p><p class="paragraph" style="text-align:left;">📚 Want a <b>SIGNED COPY</b>? <a class="link" href="http://www.kensingtonrowbookshop.com?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=60-ghosts-of-technology-past" target="_blank" rel="noopener noreferrer nofollow">Get one here</a>.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="cybersecurity-tip-of-the-week">Cybersecurity Tip of the Week</h1><h2 class="heading" style="text-align:left;" id="the-season-of-scams">The Season of Scams</h2><p class="paragraph" style="text-align:left;">As the holiday sales start flooding your feed, so do the scammers. Fake online stores and “too good to be true” Black Friday deals are everywhere—especially on social media. That jaw-dropping 70% off ad for a gaming console or limited-edition toy? It might just be a phantom storefront waiting to take your payment and vanish.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/54f8c33b-fe8a-4cea-aea1-2a627c3357d4/35CD4AA7-BE61-4C50-AE71-2C667D8F1FD2.png?t=1762714915"/></div><p class="paragraph" style="text-align:left;">Stay one step ahead: skip the ad and go directly to the retailer’s site. Use a credit card (not debit) for extra protection, and do a quick web search like “[retailer name] scam” before buying. And beware of fake charity or GoFundMe campaigns tugging at holiday heartstrings—verify before you give. This season, shop smart, scroll slow, and think twice before you click.</p><h1 class="heading" style="text-align:left;" id="appearances-of-the-week">Appearances of the Week</h1><p class="paragraph" style="text-align:left;">Highlights from the Spies, Lies & Cybercrime book tour — national TV interviews detailing steps you can take to protect yourself from holiday scams.</p><p class="paragraph" style="text-align:left;"><b>Fox Chicago – “Cybersecurity Author Warns of Holiday Scams” </b>Live from Chicago, Eric breaks down the latest holiday scams targeting shoppers and explains how to spot—and stop—them before it’s too late.</p><div class="embed"><a class="embed__url" href="https://www.fox32chicago.com/video/1730697?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=60-ghosts-of-technology-past" target="_blank"><div class="embed__content"><p class="embed__title"> Spies, lies, and cybercrime </p><p class="embed__description"> Eric O’Neill is a former FBI counterintelligence operative, famously helped capture Robert Hanssen, the most damaging spy in U.S. history. Now he’s turning his decades of insider expertise to one of today’s biggest threats that affects us all - cybercrime. </p><p class="embed__link"> www.fox32chicago.com/video/1730697 </p></div><img class="embed__image embed__image--right" src="https://images.foxtv.com/c107833-mcdn.mp.lura.live/expiretime=2082787200/b061d58546e3c4e53862dfcafb5945e3f1f1b9db32ab4b9a34dcadf59a9fe0bf/iupl/9A6/47B/1280/720/9A647B7B84330BB38E2AC24676BE0AA7.jpg?ve=1&tl=1"/></a></div><p class="paragraph" style="text-align:left;"><b>NBC Austin – “Cybersecurity Expert on Holiday Scams” </b>From fake charity drives to cloned retail sites, this NBC Austin segment explores the surge in seasonal scams and the practical defenses every consumer needs.</p><div class="embed"><a class="embed__url" href="https://www.kxan.com/video/cybersecurity-expert-on-holiday-scams/11228477/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=60-ghosts-of-technology-past" target="_blank"><div class="embed__content"><p class="embed__title"> Cybersecurity expert on holiday scams </p><p class="embed__description"> Cybersecurity expert, Eric O&#39;Neill, sits down with KXAN to talk about the increased risk of online scams during the holiday season, and how you can protect yourself. </p><p class="embed__link"> www.kxan.com/video/cybersecurity-expert-on-holiday-scams/11228477 </p></div><img class="embed__image embed__image--right" src="https://c104216-ucdn.mp.lura.live/expiretime=2082787200/356da91497192e69a6f283360653470250566b861c4ad216515a7033e3487f5b/iupl_lin/A8E/997/A8E997D31BBF40F05DBDD2A22F96ACC7.jpg"/></a></div><p class="paragraph" style="text-align:left;"><b>CBS Minneapolis – “How to Avoid Being Scammed by AI” </b>Eric joins CBS to discuss the dark side of generative AI — from deepfake fraud to impersonation scams — and what it means for trust in the digital age.</p><div class="embed"><a class="embed__url" href="https://www.cbsnews.com/minnesota/video/how-to-avoid-being-scammed-by-ai/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=60-ghosts-of-technology-past" target="_blank"><div class="embed__content"><p class="embed__title"> How to avoid being scammed by AI </p><p class="embed__description"> Former FBI and cybersecurity expert Eric O&#39;Neill says emails are still the number one way cyber attacks happen, but attackers are finding new ways. </p><p class="embed__link"> www.cbsnews.com/minnesota/video/how-to-avoid-being-scammed-by-ai </p></div><img class="embed__image embed__image--right" src="https://assets1.cbsnewsstatic.com/hub/i/r/2025/10/30/47e1a6f0-c5b6-422d-9ead-99baa3ea8042/thumbnail/1200x630/50e4b6a2de7e6e0c48198aa1b4c7743f/0b84992ecaa0bf2ead0d1bd6a00603ca.jpg"/></a></div><p class="paragraph" style="text-align:left;"><b>ABC Fresno – “Tips to Avoid Cyber Scams During Holiday Shopping” </b>Practical steps to protect your data, your wallet, and your holiday cheer while shopping online this season.</p><div class="embed"><a class="embed__url" href="https://abc30.com/post/tips-avoid-cyber-scams-holiday-shopping/18109278/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=60-ghosts-of-technology-past" target="_blank"><div class="embed__content"><p class="embed__title"> Tips to avoid cyber scams while holiday shopping </p><p class="embed__description"> While many of us may be filling out our holiday wish lists, online scammers and spies are also hard at work. </p><p class="embed__link"> abc30.com/post/tips-avoid-cyber-scams-holiday-shopping/18109278 </p></div><img class="embed__image embed__image--right" src="https://cdn.abcotvs.com/dip/images/18109794_110325-kfsn-3p-dig-cyber-scams-holiday.jpg?w=1600"/></a></div><hr class="content_break"><p class="paragraph" style="text-align:left;">Technology never says goodbye—it just replaces itself while you’re sleeping. The gadgets and habits that once defined us are quietly being erased by convenience. But maybe that’s progress: every generation thinks their tech was the last real one.</p><p class="paragraph" style="text-align:left;">So, while the next upgrade steals your remote, your keys, and probably your wallet, take a moment to remember how far we’ve come—and how much we’ve let go.</p><p class="paragraph" style="text-align:left;">Then, like a true Gen-Xer, shrug, grab a black coffee, and move on.</p><p class="paragraph" style="text-align:left;">Stay Safe,</p><p id="eric" class="paragraph" style="text-align:left;"><span style="font-family:Didot, "Didot LT STD", Garamond, "Times New Roman", serif;"><i><b>Eric</b></i></span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/f5e6766c-8572-400f-b895-4e25ac6428c4/IMG_0555.JPG?t=1761944649"/><div class="image__source"><span class="image__source_text"><p>Me in the 80s.</p></span></div></div><hr class="content_break"><h3 class="heading" style="text-align:left;" id="please-give-some-love-to-our-sponso">Please give some love to our sponsor.</h3><h3 class="heading" style="text-align:left;" id="realtime-user-onboarding-zero-engin">Realtime User Onboarding, Zero Engineering</h3><div class="image"><a class="image__link" href="https://www.quarterzip.ai/?utm_source=beehiv&utm_medium=paid&utm_campaign={{publication_alphanumeric_id}}&utm_term=v1-p-cta&_bhiiv=opp_0e8a90a7-08ad-44a2-a704-4488c71bb181_e6e4e925&bhcl_id=ec6fa4d7-c629-4dd0-837c-d1e0b5578a8a_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/35e52d14-202a-4a3c-a15e-2b520a0e9f10/Verison_A1_-_primary.png?t=1759888685"/></a></div><p class="paragraph" style="text-align:left;">Quarterzip delivers realtime, AI-led onboarding for every user with zero engineering effort.</p><p class="paragraph" style="text-align:left;">✨ <a class="link" href="https://www.quarterzip.ai/?utm_source=beehiv&utm_medium=paid&utm_campaign={{publication_alphanumeric_id}}&utm_term=v1-p-cta&_bhiiv=opp_0e8a90a7-08ad-44a2-a704-4488c71bb181_e6e4e925&bhcl_id=ec6fa4d7-c629-4dd0-837c-d1e0b5578a8a_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Dynamic Voice</a> guides users in the moment<br>✨ <a class="link" href="https://www.quarterzip.ai/?utm_source=beehiv&utm_medium=paid&utm_campaign={{publication_alphanumeric_id}}&utm_term=v1-p-cta&_bhiiv=opp_0e8a90a7-08ad-44a2-a704-4488c71bb181_e6e4e925&bhcl_id=ec6fa4d7-c629-4dd0-837c-d1e0b5578a8a_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Picture-in-Picture</a> stay visible across your site and others<br>✨ Guardrails keep things accurate with smooth handoffs if needed</p><p class="paragraph" style="text-align:left;">No code. No engineering. Just onboarding that adapts as you grow.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.quarterzip.ai/?utm_source=beehiv&utm_medium=paid&utm_campaign={{publication_alphanumeric_id}}&utm_term=v1-p-cta&_bhiiv=opp_0e8a90a7-08ad-44a2-a704-4488c71bb181_e6e4e925&bhcl_id=ec6fa4d7-c629-4dd0-837c-d1e0b5578a8a_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">See how it works</a></p><hr class="content_break"><h3 class="heading" style="text-align:left;" id="like-what-youre-reading"><b>Like What You&#39;re Reading?</b></h3><p class="paragraph" style="text-align:left;">Don’t miss a newsletter! <a class="link" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=60-ghosts-of-technology-past" target="_blank" rel="noopener noreferrer nofollow">Subscribe</a> to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=60-ghosts-of-technology-past"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><h2 class="heading" style="text-align:left;" id="lets-make-sure-my-emails-land-strai"><b>Let&#39;s make sure my emails land straight in your inbox.</b></h2><p class="paragraph" style="text-align:left;"><b>Gmail users: </b>Move this email to your primary inbox</p><p class="paragraph" style="text-align:left;"><b>On your phone? </b>Hit the 3 dots at top right corner, click &quot;Move to&quot; then &quot;Primary.&quot;</p><p class="paragraph" style="text-align:left;"><b>On desktop?</b> Close this email then drag and drop this email into the &quot;Primary&quot; tab near the top left of your screen</p><p class="paragraph" style="text-align:left;"><b>Apple mail users: </b>Tap on our email address at the top of this email (next to &quot;From:&quot; on mobile) and click “Add to VIPs”<br><br><b>For everyone else: </b><a class="link" href="https://blog.beehiiv.com/p/safelist-newsletter-senders-popular-email-services?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=60-ghosts-of-technology-past" target="_blank" rel="noopener noreferrer nofollow">follow these instructions</a></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=850675f7-3b14-42ab-a0c0-763deccd3b62&utm_medium=post_rss&utm_source=spies_lies_cybercrime">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>59: Our Near Future</title>
  <description>Spies, Lies &amp; Cybercrime by Eric O&#39;Neill</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/716402b4-06c3-4342-9c53-f2aa25ae0568/title_59_our_near_future.png" length="1067842" type="image/png"/>
  <link>https://spies-lies-cybercrime.ericoneill.net/p/our-near-future</link>
  <guid isPermaLink="true">https://spies-lies-cybercrime.ericoneill.net/p/our-near-future</guid>
  <pubDate>Tue, 04 Nov 2025 14:01:59 +0000</pubDate>
  <atom:published>2025-11-04T14:01:59Z</atom:published>
    <dc:creator>Eric ONeill</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b><a class="link" href="#title-story" rel="noopener noreferrer nofollow">Title Story: </a></b>A mysterious asteroid slips into orbit beside us — a cosmic twin that mirrors our own changing world.</p><p class="paragraph" style="text-align:left;"><a class="link" href="#new-technologies-of-today" rel="noopener noreferrer nofollow">New Technologies of Today: </a>Breakthroughs already reshaping life on Earth — from brain chips that restore sight to AI that builds entire worlds.</p><p class="paragraph" style="text-align:left;"><a class="link" href="#new-technologies-of-the-future" rel="noopener noreferrer nofollow">New Technologies of The Future: </a>A look ahead at the inventions poised to redefine humanity — fusion power, brain-computer links, and life beyond Mars.</p></div><h2 class="heading" style="text-align:left;" id="the-age-of-the-almost-impossible">The Age of the Almost-Impossible</h2><p class="paragraph" style="text-align:left;">The future rarely arrives with a bang. It slips quietly through labs, algorithms, and prototypes until one day it’s ordinary.</p><p class="paragraph" style="text-align:left;">Some technologies once dismissed as science fiction are already here. Others hover just beyond the horizon. And a few that once defined modern life are fading fast.</p><p class="paragraph" style="text-align:left;">Here’s what’s emerging, what’s coming, and what’s vanishing.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="title-story">Title Story</h1><h2 class="heading" style="text-align:left;" id="the-night-earth-found-a-second-moon">The Night Earth Found a Second Moon</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/716402b4-06c3-4342-9c53-f2aa25ae0568/title_59_our_near_future.png?t=1761925265"/></div><p class="paragraph" style="text-align:left;">It started as a blip.</p><p class="paragraph" style="text-align:left;">At 3:12 a.m., high on Mauna Kea, a graduate researcher noticed something odd in the telescope data — a slow-moving object that shouldn’t have been there. Too steady to be space junk, too dim to be a passing satellite.</p><p class="paragraph" style="text-align:left;">Hours later, astronomers confirmed it: a skyscraper-sized asteroid, cataloged as <b>2025 PN7</b>, had slipped into a gravitational dance with Earth. For the next sixty years, it will circle the Sun in near-perfect sync with our planet — a celestial hitchhiker that, from our vantage point, seems to orbit us. A <b>“quasi-moon.”</b></p><p class="paragraph" style="text-align:left;">It won’t cause tidal shifts or eclipse the night sky. Most of us will never see it without a powerful telescope. But it’s there — trailing our world in quiet synchrony, like a ghost reflection of the Earth we know.</p><p class="paragraph" style="text-align:left;">To scientists, it’s a rare orbital alignment.</p><p class="paragraph" style="text-align:left;">To storytellers, it’s something more: a symbol of this strange era we’re entering — where the familiar world gains digital shadows, artificial doubles, and parallel versions that orbit just beyond sight.</p><p class="paragraph" style="text-align:left;">In this special issue of <i>Spies, Lies & Cybercrime</i>, we’re stepping away from the covert world of espionage and cybercrime to explore <b>the future itself</b> — the technologies transforming what it means to be human… and the relics of the modern age that will soon fade into history.</p><p class="paragraph" style="text-align:left;">A second moon. A second world.</p><p class="paragraph" style="text-align:left;">Maybe the universe has been trying to tell us something all along.</p><p class="paragraph" style="text-align:left;">Just as Earth has found its quiet twin in the sky, humanity is discovering new reflections of itself here on the ground — machines that think, devices that feel, and technologies that learn faster than we can adapt. The future is no longer a distant frontier; it’s orbiting closer every day.</p><p class="paragraph" style="text-align:left;">In this issue, we’ll explore the breakthroughs already transforming our world, the innovations that will define the next century, and the technologies we’ll soon leave behind — a guided tour through <b>our near future</b>.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="new-technologies-of-today">New Technologies of Today</h1><h2 class="heading" style="text-align:left;" id="where-science-fiction-has-already-c">Where science fiction has already crossed into daily life.</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/218ac930-c14e-4447-85e5-dd968ef081cd/title_image_59.png?t=1761924711"/></div><h3 class="heading" style="text-align:left;" id="breakthrough-brain-chip-helps-the-b"><span style="font-family:Helvetica;"><b>Breakthrough brain chip helps the blind see again</b></span></h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Stanford researchers have restored sight to patients with advanced macular degeneration using an implanted micro-chip paired with smart glasses—27 of 32 participants regained the ability to read within a year. The device, called </span><span style="font-family:Helvetica;"><i>PRIMA</i></span><span style="font-family:Helvetica;">, converts infrared images into electrical signals that mimic natural vision, with some users achieving acuity as sharp as 20/42. </span>🔗<span style="font-family:Helvetica;"> </span><span style="color:blue;"><b><a class="link" href="https://med.stanford.edu/news/all-news/2025/10/eye-prosthesis.html?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow">Learn more — Stanford Medicine: Restoring Sight with the PRIMA Implant</a></b></span></p><h3 class="heading" style="text-align:left;" id="retina-e-paper-makes-virtual-realit"><span style="font-family:Helvetica;"><b>Retina E-Paper makes virtual reality indistinguishable from life</b></span></h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">A Swedish team has created displays with 25,000 pixels per inch, exceeding what the human eye can discern. Using tungsten-oxide nanoparticle metapixels, the display reflects ambient light like e-paper but refreshes fast enough for video—offering VR so lifelike it’s hard to tell what’s real. </span>🔗<span style="font-family:Helvetica;"> </span><span style="color:blue;"><b><a class="link" href="https://interestingengineering.com/innovation/retina-epaper-nanoparticle-human-eye-clarity?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow">Learn more — Interesting Engineering: Retina E-Paper Breakthrough</a></b></span></p><h3 class="heading" style="text-align:left;" id="teslas-synthetic-driving-worlds"><span style="font-family:Helvetica;"><b>Tesla’s synthetic driving worlds</b></span></h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Tesla now trains its self-driving AI inside simulated universes, driving millions of virtual miles per day. These synthetic environments expose the system to rare hazards—from black ice to kangaroos—without a single fender bender. </span>🔗<span style="font-family:Helvetica;"> </span><span style="color:blue;"><b><a class="link" href="https://www.technologyreview.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow">Learn more — MIT Technology Review: Inside Tesla’s Simulation Engine</a></b></span></p><h3 class="heading" style="text-align:left;" id="nikes-robotic-shoes-turn-running-in">Nike’s robotic shoes turn running into a cakewalk</h3><p class="paragraph" style="text-align:left;">Nike’s <i>Project Amplify</i> introduces the world’s first powered running system — shoes that act like a “second set of calf muscles,” propelling recreational runners up hills as if they were on flat ground. Designed for the 10–12 minute mile crowd, the tech blends biomechanics with robotics to reduce strain and boost endurance — though it may be years before this futuristic footwear hits store shelves. 🔗 <b><a class="link" href="https://about.nike.com/en/newsroom/releases/nike-project-amplify-official-images?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow" style="color: blue">Learn more — Fast Company: Inside Nike’s Project Amplify Robotic Running Shoes</a></b></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/e2c4b370-48d5-4eee-aa63-f9a3785998fc/Screenshot_2025-11-01_at_2.10.54_PM.png?t=1762020669"/><div class="image__source"><span class="image__source_text"><p>Image Source: Nike</p></span></div></div><h3 class="heading" style="text-align:left;" id="amazons-robotic-revolution-leaks"><span style="font-family:Helvetica;"><b>Amazon’s robotic revolution leaks</b></span></h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Internal documents reveal Amazon aims to automate up to 75% of its U.S. operations, replacing roughly 600,000 warehouse workers with mobile robots capable of real-time object recognition and navigation. </span>🔗<span style="font-family:Helvetica;"> </span><span style="color:blue;"><b><a class="link" href="https://www.theinformation.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow">Learn more — The Information: Amazon’s Automation Ambitions</a></b></span></p><h3 class="heading" style="text-align:left;" id="ai-agents-take-the-wheel-of-your-br"><span style="font-family:Helvetica;"><b>AI agents take the wheel of your browser</b></span></h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">New platforms like ChatGPT’s </span><span style="font-family:Helvetica;"><i>Browser Atlas</i></span><span style="font-family:Helvetica;"> and </span><span style="font-family:Helvetica;"><i>Claude Desktop</i></span><span style="font-family:Helvetica;"> now browse, click, and schedule tasks for you—turning the web into an active assistant instead of a passive tool. </span>🔗<span style="font-family:Helvetica;"> </span><span style="color:blue;"><b><a class="link" href="https://openai.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow">Learn more — OpenAI Blog: Custom GPTs and Browser Agents</a></b></span></p><h3 class="heading" style="text-align:left;" id="quantum-supremacy-draws-closer"><span style="font-family:Helvetica;"><b>Quantum supremacy draws closer</b></span></h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">IBM’s 120-qubit </span><span style="font-family:Helvetica;"><i>Cat</i></span><span style="font-family:Helvetica;"> chip and Google’s </span><span style="font-family:Helvetica;"><i>Willow</i></span><span style="font-family:Helvetica;"> processor have demonstrated “verifiable quantum advantage,” completing complex calculations 13,000× faster than supercomputers. </span>🔗<span style="font-family:Helvetica;"> </span><span style="color:blue;"><b><a class="link" href="https://quantumcomputingreport.com/google-quantum-ai-achieves-verifiable-quantum-advantage-on-willow-chip-with-quantum-echoes-algorithm?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow">Learn more — Quantum Computing Report: IBM and Google’s Quantum Leap</a></b></span></p><p class="paragraph" style="text-align:left;">The boundary between human and machine, digital and physical, is already dissolving.</p><hr class="content_break"><h3 class="heading" style="text-align:left;" id="like-what-youre-reading"><b>Like What You&#39;re Reading?</b></h3><p class="paragraph" style="text-align:left;">Don’t miss a newsletter! <a class="link" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow" style="color: blue">Subscribe</a> to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><hr class="content_break"><h1 class="heading" style="text-align:left;" id="new-technologies-of-the-future">New Technologies of The Future</h1><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/5fe4532c-4dc5-41c7-ac3f-728ae49c6123/future_tech.png?t=1761924731"/></div><h2 class="heading" style="text-align:left;" id="where-science-fiction-has-already-c">Visions in development that could define the next century</h2><h3 class="heading" style="text-align:left;" id="humanlevel-ai"><span style="font-family:Helvetica;"><b>Human-level AI</b></span></h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Within 25 years, AI could match human reasoning and creativity. Neuromorphic processors—chips modeled on the brain—promise intelligence that learns, adapts, and consumes a fraction of current power. </span>🔗<span style="font-family:Helvetica;"> </span><span style="color:blue;"><b><a class="link" href="https://investorplace.com/hypergrowthinvesting/2025/09/beyond-gpus-why-neuromorphic-chips-could-power-the-future-of-ai?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow">Learn more — InvestorPlace: Neuromorphic Chips and the Future of AI</a></b></span></p><h3 class="heading" style="text-align:left;" id="fusion-power"><span style="font-family:Helvetica;"><b>Fusion power</b></span></h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Fusion reactors are edging toward commercial reality, with experiments achieving net energy gain and new materials capable of surviving Sun-like plasma. Clean, limitless energy may soon be more than theory. </span>🔗<span style="font-family:Helvetica;"> </span><span style="color:blue;"><b><a class="link" href="https://www.nature.com/articles/d41586-025-02105-3?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow">Learn more — Nature: Progress Toward Fusion Energy</a></b></span></p><h3 class="heading" style="text-align:left;" id="quantum-internet"><span style="font-family:Helvetica;"><b>Quantum internet</b></span></h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Entangled particles could transmit unhackable data across the planet. Early prototypes already link labs via quantum key distribution; next come intercontinental “quantum repeaters.” </span>🔗<span style="font-family:Helvetica;"> </span><span style="color:blue;"><b><a class="link" href="https://www.scientificamerican.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow">Learn more — Scientific American: Building the Quantum Internet</a></b></span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/1d2b2a76-32a7-42fc-af7e-c7881658f0bb/our_near_future.png?t=1761925114"/></div><h3 class="heading" style="text-align:left;" id="braincomputer-interfaces"><span style="font-family:Helvetica;"><b>Brain-computer interfaces</b></span></h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Neural chips are decoding inner speech with 74% accuracy and imagined movement in real time. “Telepathic typing” may soon move from experiment to everyday use. </span>🔗<span style="font-family:Helvetica;"> </span><span style="color:blue;"><b><a class="link" href="https://www.forbes.com/sites/jasonsnyder/2025/08/31/ai-can-read-your-thoughts---the-future-of-brain-computer-interfaces?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow">Learn more — Forbes: AI Can Read Your Thoughts</a></b></span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/3515ac40-c25c-44c1-8b04-0e64ab0549b8/Screenshot_2025-11-01_at_2.12.34_PM.png?t=1762020771"/><div class="image__source"><span class="image__source_text"><p>Image Source: Forbes</p></span></div></div><h3 class="heading" style="text-align:left;" id="asteroid-mining"><span style="font-family:Helvetica;"><b>Asteroid mining</b></span></h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Private companies are eyeing asteroids containing more platinum and nickel than Earth has ever mined. The next gold rush could happen in orbit. </span>🔗<span style="font-family:Helvetica;"> </span><span style="color:blue;"><b><a class="link" href="https://www.space.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow">Learn more — </a></b></span><span style="color:blue;"><b><a class="link" href="https://Space.com?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow">Space.com</a></b></span><span style="color:blue;"><b><a class="link" href="https://www.space.com/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow">: The Coming Asteroid Mining Race</a></b></span></p><h3 class="heading" style="text-align:left;" id="space-elevator"><span style="font-family:Helvetica;"><b>Space elevator</b></span></h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Carbon-nanotube cables may one day lift cargo 36,000 km into orbit—no rockets required. New studies suggest it’s more feasible than once believed. </span>🔗<span style="font-family:Helvetica;"> </span><span style="color:blue;"><b><a class="link" href="https://www.sciencedirect.com/science/article/pii/S0094576523001704?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow">Learn more — ScienceDirect: Mechanical Challenges of the Space Elevator</a></b></span></p><h3 class="heading" style="text-align:left;" id="colonies-on-mars"><span style="font-family:Helvetica;"><b>Colonies on Mars</b></span></h3><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">NASA and private partners are testing 3D-printed habitats and in-situ resource use for the first human bases on Mars, expected by the 2040s. </span>🔗<span style="font-family:Helvetica;"> </span><span style="color:blue;"><b><a class="link" href="https://www.nasa.gov/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow">Learn more — NASA: Mars Habitat Challenge</a></b></span></p><p class="paragraph" style="text-align:left;">Tomorrow’s engineering projects aren’t dreams, they’re blueprints for the future.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="get-the-book-that-started-the-newsl">Get the Book that Started the Newsletter</h1><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/78e98dff-7972-4401-9a7d-d3f1441a618e/David_Preiss.png?t=1761577188"/></div><p class="paragraph" style="text-align:left;">Thanks to all of you, my book, <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow">Spies, Lies, and Cybercrime</a>, is an <a class="link" href="https://www.usatoday.com/booklist/books/spies-lies-and-cybercrime-cybersecurity-tactics-to-outsmart-hackers-and-disarm-scammers/9780063398177/2025-10-15?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow">instant national bestseller</a> and an <a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow">Amazon #1 Bestseller</a> in a dozen categories.</p><ol start="1"><li><p class="paragraph" style="text-align:left;">f you haven’t already, please buy <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future#order" target="_blank" rel="noopener noreferrer nofollow">SPIES, LIES, AND CYBERCRIME</a>. If you already have, <i><b>thank you</b></i>, and please consider gifting some to friends and colleagues. It makes a perfect holiday gift for anyone you want to protect from cyber scams. </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.amazon.com/review/create-review/?ie=UTF8&channel=glance-detail&asin=0063398176&utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow">Leave a 5-star review on Amazon</a>. Reviews are the secret weapon that triggers Amazon’s algorithm to share the book with thousands of new readers who might not otherwise find it — and might otherwise fall prey to an attack.</p></li><li><p class="paragraph" style="text-align:left;">Please share! Forward this email to your friends and family. Here&#39;s an easy-to-post <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow">cover graphic</a>, here&#39;s a <a class="link" href="https://www.linkedin.com/pulse/spies-lies-cybercrime-five-lessons-from-book-eric-o-neill-l6l3e/?trackingId=A1cDw4nCjJmOs87%2B4v2ZFA%3D%3D&utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow">Linkedin post</a>, here&#39;s an <a class="link" href="https://www.instagram.com/reel/DPuhA8ckqMB/?utm_source=ig_web_copy_link&igsh=MzRlODBiNWFlZA==" target="_blank" rel="noopener noreferrer nofollow">IG reel </a>and a <a class="link" href="https://www.instagram.com/p/DOos4ptgW_2/?utm_source=ig_web_copy_link&igsh=MzRlODBiNWFlZA==" target="_blank" rel="noopener noreferrer nofollow">post</a>.</p></li><li><p class="paragraph" style="text-align:left;">Want a <b>SIGNED COPY</b>? <a class="link" href="http://www.kensingtonrowbookshop.com?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow">Get one here</a>.</p></li></ol><p class="paragraph" style="text-align:left;"><b>“An astonishingly up-to-date review of the tools and techniques used by criminal hackers…O’Neill will have you on the edge of your seat.” </b>—Marc Goodman, New York Times bestselling author of Future Crimes</p><hr class="content_break"><p class="paragraph" style="text-align:left;">The future isn’t waiting at the horizon anymore—it’s already orbiting us, quietly reshaping how we live, work, and think. Like our newfound “second moon,” these innovations circle closer each year, altering our gravity without fanfare. Some of what we build will illuminate humanity’s brilliance; some will fade into digital dust. But every advance, every vanished relic, and every artificial twin we create brings us closer to answering the question that has followed us since we first looked up at the stars: <b>what kind of world are we choosing to build next?</b></p><p class="paragraph" style="text-align:left;">Stay Safe,</p><p id="eric" class="paragraph" style="text-align:left;"><span style="font-family:Didot, "Didot LT STD", Garamond, "Times New Roman", serif;"><i><b>Eric</b></i></span></p><hr class="content_break"><h3 class="heading" style="text-align:left;" id="a-quick-word-from-our-sponsor-pleas">A quick word from our sponsor. Please click and check them out!</h3><h3 class="heading" style="text-align:left;" id="personalized-onboarding-for-every-u">Personalized Onboarding for Every User </h3><div class="image"><a class="image__link" href="https://www.quarterzip.ai/?utm_source=beehiv&utm_medium=paid&utm_campaign={{publication_alphanumeric_id}}&utm_term=v2-p-cta&_bhiiv=opp_9fcb22f6-5b7c-416f-bf46-525e5e108da4_e6e4e925&bhcl_id=d09661dc-2142-4d88-b5f7-65bd64171645_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/a0777bdb-889e-4265-b23f-e8c62dd2cd63/Version_B_-_primary.png?t=1759888729"/></a></div><p class="paragraph" style="text-align:left;">Quarterzip makes user onboarding seamless and adaptive. No code required.</p><p class="paragraph" style="text-align:left;">✨ <a class="link" href="https://www.quarterzip.ai/?utm_source=beehiv&utm_medium=paid&utm_campaign={{publication_alphanumeric_id}}&utm_term=v2-p-cta&_bhiiv=opp_9fcb22f6-5b7c-416f-bf46-525e5e108da4_e6e4e925&bhcl_id=d09661dc-2142-4d88-b5f7-65bd64171645_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Analytics and insights</a> track onboarding progress, sentiment, and revenue opportunities<br>✨ <a class="link" href="https://www.quarterzip.ai/?utm_source=beehiv&utm_medium=paid&utm_campaign={{publication_alphanumeric_id}}&utm_term=v2-p-cta&_bhiiv=opp_9fcb22f6-5b7c-416f-bf46-525e5e108da4_e6e4e925&bhcl_id=d09661dc-2142-4d88-b5f7-65bd64171645_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Branding and personalization</a> match the assistant’s look, tone, and language to your brand.<br>✨ Guardrails keep things accurate with smooth handoffs if needed</p><p class="paragraph" style="text-align:left;">Onboarding that’s personalized, measurable, and built to grow with you.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.quarterzip.ai/?utm_source=beehiv&utm_medium=paid&utm_campaign={{publication_alphanumeric_id}}&utm_term=v2-p-cta&_bhiiv=opp_9fcb22f6-5b7c-416f-bf46-525e5e108da4_e6e4e925&bhcl_id=d09661dc-2142-4d88-b5f7-65bd64171645_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">See how it works</a></p><hr class="content_break"><h3 class="heading" style="text-align:left;" id="like-what-youre-reading"><b>Like What You&#39;re Reading?</b></h3><p class="paragraph" style="text-align:left;">Don’t miss a newsletter! <a class="link" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow">Subscribe</a> to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><h2 class="heading" style="text-align:left;" id="lets-make-sure-my-emails-land-strai"><b>Let&#39;s make sure my emails land straight in your inbox.</b></h2><p class="paragraph" style="text-align:left;"><b>Gmail users: </b>Move this email to your primary inbox</p><p class="paragraph" style="text-align:left;"><b>On your phone? </b>Hit the 3 dots at top right corner, click &quot;Move to&quot; then &quot;Primary.&quot;</p><p class="paragraph" style="text-align:left;"><b>On desktop?</b> Close this email then drag and drop this email into the &quot;Primary&quot; tab near the top left of your screen</p><p class="paragraph" style="text-align:left;"><b>Apple mail users: </b>Tap on our email address at the top of this email (next to &quot;From:&quot; on mobile) and click “Add to VIPs”<br><br><b>For everyone else: </b><a class="link" href="https://blog.beehiiv.com/p/safelist-newsletter-senders-popular-email-services?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=59-our-near-future" target="_blank" rel="noopener noreferrer nofollow">follow these instructions</a></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=016d0a7e-4ee9-4508-aa92-0957618401b2&utm_medium=post_rss&utm_source=spies_lies_cybercrime">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>58: The Paris Heist</title>
  <description>Spies, Lies &amp; Cybercrime by Eric O&#39;Neill</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/961c18d9-eaa5-4878-85b7-537e703d0b67/Paris_Heist.png" length="1554379" type="image/png"/>
  <link>https://spies-lies-cybercrime.ericoneill.net/p/the-paris-heist</link>
  <guid isPermaLink="true">https://spies-lies-cybercrime.ericoneill.net/p/the-paris-heist</guid>
  <pubDate>Tue, 28 Oct 2025 13:00:30 +0000</pubDate>
  <atom:published>2025-10-28T13:00:30Z</atom:published>
    <dc:creator>Eric ONeill</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">This week cybercrime has taken an unprecedented backseat to physical crime! The famous Louvre Museum in Paris gets robbed and the mafia has leapt back onto the scene in two shocking, and related stories where NBA basketball, the mafia and poker collide!</p><p class="paragraph" style="text-align:left;">Before we get to it, I have a favor to ask. If you’ve read my new book Spies, Lies, and Cybercrime, or listened to the audible version (with me reading it!) please leave me <a class="link" href="https://www.amazon.com/review/create-review/?ie=UTF8&channel=glance-detail&asin=0063398176&utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=58-the-paris-heist" target="_blank" rel="noopener noreferrer nofollow">a review on Amazon</a>. The more reviews, the more Amazon pushed the book before the eyes (and hopefully into the hands) of other future spy hunters. </p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b><a class="link" href="#title-story" rel="noopener noreferrer nofollow">Title Story: </a></b>A four-minute masterpiece of precision and nerve, as thieves slip into the Louvre in daylight and vanish with $102 million in royal jewels.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#cybersecurity-tip-of-the-week" rel="noopener noreferrer nofollow">Cybersecurity Tip of the Week:</a></b><a class="link" href="#cybersecurity-tip-of-the-week" rel="noopener noreferrer nofollow"> </a>The surest way to stop a thief isn’t with firewalls or cameras—it’s knowing your data well enough to spot when someone’s misusing it.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#crime-of-the-week" rel="noopener noreferrer nofollow">Crime of the Week: </a></b>The FBI just busted a nationwide sports-betting and poker racket tying NBA stars to old-school mob families.</p><p class="paragraph" style="text-align:left;"><a class="link" href="#spy-craft-insight" rel="noopener noreferrer nofollow">SpyCraft Insight: </a>From Paris to the NBA, every successful crime—and every spy mission—runs on one thing: privileged information.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#appearances-of-the-week" rel="noopener noreferrer nofollow">Appearances of the Week:</a></b><a class="link" href="#appearances-of-the-week" rel="noopener noreferrer nofollow"> </a>I discuss the CIA in Venezuela, the AWS glitch, tips and and tricks to protect yourself and your family, all while on the road promoting Spies, Lies, and Cybercrime.</p><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-trend-of-the-week" rel="noopener noreferrer nofollow">AI Trend Of the Week:</a> Cats. With Guns?!</p></div><h1 class="heading" style="text-align:left;" id="title-story">Title Story</h1><h2 class="heading" style="text-align:left;" id="the-paris-heist-the-mafias-comeback">The Paris Heist, the Mafia’s Comeback, and the Return of the Old World Criminal</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/961c18d9-eaa5-4878-85b7-537e703d0b67/Paris_Heist.png?t=1761577936"/></div><p class="paragraph" style="text-align:left;">Early Sunday morning on October 19, 2025, the doors of the Louvre Museum opened to the public as usual. By around 9:30 a.m., in the stepped halls beneath the glass pyramid, a small team of four intruders struck. They arrived mounted on a basket-lift truck parked outside the Seine façade, climbed into the air, forced a window on the second floor, and entered the gallery that holds France’s remaining crown jewels: the ornate Galerie d’Apollon. </p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/d1c98078-594f-4457-ae0f-4761280c79bc/map_courtesy_of_BBC.jpg?t=1761586736"/><div class="image__source"><span class="image__source_text"><p>Map courtesy of the BBC.</p></span></div></div><p class="paragraph" style="text-align:left;">Inside, guards were threatened and forced to evacuate. Within minutes, sparks flew as the thieves sliced through two display cases, grabbed eight royal artifacts—including a diamond bow once worn by Empress Eugénie—and fled. By 9:38, they were gone, weaving into Paris traffic on two scooters, their $102 million haul hidden under tool bags.</p><p class="paragraph" style="text-align:left;">The Louvre’s director later told French senators that the only exterior camera facing the wall had been angled away, leaving the balcony and window unmonitored. A third of the rooms in that section had no CCTV at all. The heist lasted four minutes in a museum famous for security.</p><p class="paragraph" style="text-align:left;">Investigators say the criminals were undeterred by the presence of guards and tourists. They neither used guns nor caused visible bloodshed. Instead, they relied on speed, stealth, and structural access from below—parking the lift, climbing into the gallery early, and slipping out before full security could mobilize. </p><p class="paragraph" style="text-align:left;">Police flooded Paris, collecting DNA, fingerprints, and security footage from nearby streets. One week later, investigators made their first arrests: two men known for jewelry theft, one caught at Charles de Gaulle Airport as he tried to flee the country. Their DNA matched samples lifted from the scene. Both are now in custody, and the hunt for their partners (and the missing jewels) continues.</p><p class="paragraph" style="text-align:left;">The backdrop adds weight: much of France’s royal-jewel collection was lost during the Revolution, and surviving pieces were auctioned off in the 19th century, bought in large part by an American jewel magnate. These eight objects were among the last remaining physical links to a monarchy that France renounced—and now they’re stolen again. Security at the Louvre is now under scrutiny. </p><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="border-radius:0px 0px 0px 0px;border-style:solid;border-width:0px 0px 0px 0px;box-sizing:border-box;border-color:#E5E7EB;" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/a7faa8bc-7f6d-4a20-b31d-86ddbdb26fbe/A_crown_worn_by_French_Empress_Eug%C3%A9nie_was_targeted_by_thieves_during_a_heist_at_Paris__Louvre_Museum_on_October_19__but_was_dropped_during_their_escape.jpg?t=1761586615"/><div class="image__source"><span class="image__source_text"><p>A crown worn by French Empress Eugénie was targeted by thieves during a heist at Paris’ Louvre Museum on October 19, but was dropped during their escape.</p></span></div></div></td><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="border-radius:0px 0px 0px 0px;border-style:solid;border-width:0px 0px 0px 0px;box-sizing:border-box;border-color:#E5E7EB;" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/646d81bf-6d43-48ad-9e6a-d06030fc0570/A_jewel-encrusted_brooch_worn_by_French_Empress_Eug%C3%A9nie.jpg?t=1761586627"/><div class="image__source"><span class="image__source_text"><p>A jewel-encrusted brooch worn by French Empress Eugénie.</p></span></div></div></td></tr></table><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="border-radius:0px 0px 0px 0px;border-style:solid;border-width:0px 0px 0px 0px;box-sizing:border-box;border-color:#E5E7EB;" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/698e1b37-2b40-4d5c-8f28-110ede6135f2/A_tiara_adorned_with_pearls_worn_by_French_Empress_Eug%C3%A9nie.jpg?t=1761586638"/><div class="image__source"><span class="image__source_text"><p>A tiara adorned with pearls worn by French Empress Eugénie.</p></span></div></div></td><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="border-radius:0px 0px 0px 0px;border-style:solid;border-width:0px 0px 0px 0px;box-sizing:border-box;border-color:#E5E7EB;" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/42a7e1af-f45e-4c74-ae9e-0e29423e4966/crown_jewels.jpg?t=1761586659"/><div class="image__source"><span class="image__source_text"><p>The Crown Jewels.</p></span></div></div></td></tr></table><p class="paragraph" style="text-align:left;">The thieves’ choices suggest careful reconnaissance. They picked the gallery where the priceless jewels were on display, timed the entry just after opening, used external access from a construction façade, and left behind tools and the lift truck that still bear forensic marks.</p><p class="paragraph" style="text-align:left;">The Louvre reopened its doors, but the Galerie d’Apollon remains sealed. The jewels, relics of kings and emperors, have vanished. Not to war or revolution, but to precision, timing, and someone who knew exactly where the cameras didn’t look.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="cybersecurity-tip-of-the-week">Cybersecurity Tip of the Week </h1><h2 class="heading" style="text-align:left;" id="subtitle">How to Spot a Trusted Insider</h2><p class="paragraph" style="text-align:left;">Every great heist begins with trust. The Louvre thieves may have slipped in through a second-floor window, but it’s likely that someone opened a different kind of door for them. Maybe it was a contractor who knew that the cameras weren’t watching that street. Maybe a staff member shared the security protocols and response time for an armed theft. However it happened, they exploited what every spy and every cybercriminal knows: it’s easier to be invited in than to break in. </p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/aa8276b7-cabc-4c4e-8c5c-53fc54bd7921/The_Paris_Heist_Image.png?t=1761579091"/></div><p class="paragraph" style="text-align:left;">The same rule applies in cybersecurity. Most breaches don’t start with a hacker in a hoodie; they start with an insider—an employee, contractor, or partner—who already has access. Sometimes the betrayal is intentional: a disgruntled worker, a spy, or someone offered money by a competitor or foreign actor. More often, it’s unintentional: a person tricked by social engineering, spear-phishing, or simple curiosity. </p><p class="paragraph" style="text-align:left;">Insiders leave traces before they leave the building. Watch for the patterns that don’t fit. An employee suddenly working odd hours, accessing systems they normally wouldn’t. Someone downloading large amounts of data “for backup.” Staff who grow defensive when questioned about projects or who seem unreasonably curious about unrelated information. Even small anomalies—a USB drive that keeps reappearing on desks, a badge scan after hours—should trigger a quiet review, not a shrug. Most importantly, build a culture where people aren’t afraid to speak up. Insiders thrive in silence. </p><p class="paragraph" style="text-align:left;">The Louvre’s jewels were protected by glass, sensors, and guards. None of it mattered if someone inside shared the map. The same is true in every company that treats cybersecurity as a technology problem instead of a people problem. Spies don’t breach firewalls, they exploit trust.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="crime-of-the-week">Crime of the Week</h1><h2 class="heading" style="text-align:left;" id="the-mafia-makes-a-comeback">The Mafia Makes a Comeback</h2><p class="paragraph" style="text-align:left;">Cybercrime has dominated headlines for years—but this week, old-school organized crime muscled its way back into the spotlight. In an FBI sting stretching across 11 states, over 30 people were arrested, including Miami Heat guard Terry Rozier and Portland Trail Blazers head coach Chauncey Billups.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/a9e9ba9a-88b5-4ae4-bd58-c954dfb9396f/The_Mafia_Comeback_Image.png?t=1761579113"/></div><p class="paragraph" style="text-align:left;">The charges: wire fraud, money laundering, extortion, and illegal gambling. Also, a link to the mafia: the Bonanno, Gambino, Genovese, and Lucchese families.</p><p class="paragraph" style="text-align:left;">According to the DOJ, two intertwined conspiracies emerged. The first was a sports-betting scheme exploiting insider NBA information. Players would allegedly sit, feign injury, or exit early, allowing insiders to “bet the under” and make a small fortune. The second was a high-tech poker operation where former NBA players (A.K.A. mob-backed “Face Cards”) would entice wealthy VIPS into rigged games of Poker. Unbeknownst to the “Fish,” everyone at the table, including the NGA celebrity and the dealer was in on the scam. They even used wireless cheating devices and Xray machines to rig the game.</p><p class="paragraph" style="text-align:left;">The FBI called it “one of the most brazen sports corruption cases since sports betting became legal.”</p><p class="paragraph" style="text-align:left;">It’s a reminder that while ransomware may rule the digital world, the analog crooks never retired—they just waited for the odds to swing their way. When sports, tech, and the mob overlap, the house doesn’t win. The house is complicit.</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="cybersecurity-tip-of-the-week">Cybersecurity Tip of the Week </h1><h2 class="heading" style="text-align:left;" id="spy-craft-insight">SpyCraft Insight</h2><p class="paragraph" style="text-align:left;">Every crime in this issue, from Paris to Portland, turns on one truth: information pays. The Louvre thieves knew the museum’s blind spots. The mafia knew which athletes to reach and how to hook VIP “fishes” with athletes in their pocket. In both cases, the advantage was knowledge, not strength or skill. Spies, hackers, and hustlers all live by the same rule: whoever controls the information controls the outcome.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/0545bc4d-e415-421c-ac0b-07c197feef74/901C3BAC-D6CE-480E-A395-EC09A9690AC5.png?t=1761587956"/></div><p class="paragraph" style="text-align:left;">To turn the tables we need to think like the spies and criminals that seek to deceive us so that we can recognize the threat and respond like Spy Hunters. This begins with knowledge of our own that takes the playbook from the adversary and allows us to know their moves before they make them. Fortunately, there’s a <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=58-the-paris-heist" target="_blank" rel="noopener noreferrer nofollow">bestselling book</a> for that!</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="love-the-newsletter-get-the-bestsel">Love the Newsletter? Get the bestselling book!</h1><p class="paragraph" style="text-align:left;">Thanks to all of you, my book, <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=58-the-paris-heist" target="_blank" rel="noopener noreferrer nofollow">Spies, Lies, and Cybercrime</a>, is an <a class="link" href="https://www.usatoday.com/booklist/books/spies-lies-and-cybercrime-cybersecurity-tactics-to-outsmart-hackers-and-disarm-scammers/9780063398177/2025-10-15?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=58-the-paris-heist" target="_blank" rel="noopener noreferrer nofollow">instant national bestseller</a> and an <a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=58-the-paris-heist" target="_blank" rel="noopener noreferrer nofollow">Amazon #1 Bestseller</a>.</p><ol start="1"><li><p class="paragraph" style="text-align:left;">f you haven’t already, please buy <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=58-the-paris-heist#order" target="_blank" rel="noopener noreferrer nofollow">SPIES, LIES, AND CYBERCRIME</a>. If you already have, <i><b>thank you</b></i>, and please consider gifting some to friends and colleagues. It makes a perfect holiday gift for anyone you want to protect from cyber scams. </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.amazon.com/review/create-review/?ie=UTF8&channel=glance-detail&asin=0063398176&utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=58-the-paris-heist" target="_blank" rel="noopener noreferrer nofollow">Leave a 5-star review on Amazon</a>. Reviews are the secret weapon that triggers Amazon’s algorithm to share the book with thousands of new readers who might not otherwise find it — and might otherwise fall prey to an attack.</p></li><li><p class="paragraph" style="text-align:left;">Please share! Forward this email to your friends and family. Here&#39;s an easy-to-post <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=58-the-paris-heist" target="_blank" rel="noopener noreferrer nofollow">cover graphic</a>, here&#39;s a <a class="link" href="https://www.linkedin.com/pulse/spies-lies-cybercrime-five-lessons-from-book-eric-o-neill-l6l3e/?trackingId=A1cDw4nCjJmOs87%2B4v2ZFA%3D%3D&utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=58-the-paris-heist" target="_blank" rel="noopener noreferrer nofollow">Linkedin post</a>, here&#39;s an <a class="link" href="https://www.instagram.com/reel/DPuhA8ckqMB/?utm_source=ig_web_copy_link&igsh=MzRlODBiNWFlZA==" target="_blank" rel="noopener noreferrer nofollow">IG reel </a>and a <a class="link" href="https://www.instagram.com/p/DOos4ptgW_2/?utm_source=ig_web_copy_link&igsh=MzRlODBiNWFlZA==" target="_blank" rel="noopener noreferrer nofollow">post</a>.</p></li><li><p class="paragraph" style="text-align:left;">Want a <b>SIGNED COPY</b>? <a class="link" href="http://www.kensingtonrowbookshop.com?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=58-the-paris-heist" target="_blank" rel="noopener noreferrer nofollow">Get one here</a>.</p></li></ol><hr class="content_break"><h1 class="heading" style="text-align:left;" id="appearances-of-the-week">Appearances of the Week</h1><p class="paragraph" style="text-align:left;">I’ve been busy promoting Spies, Lies, and Cybercrime and informing viewers and readers everywhere to be careful of online threats and the upcoming holiday scams.</p><p class="paragraph" style="text-align:left;">Here I am in a <a class="link" href="https://www.forbes.com/sites/rachelwells/2025/10/22/aws-outage-sparks-former-fbi-agent-warning-for-every-workplace-in-2026/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=58-the-paris-heist" target="_blank" rel="noopener noreferrer nofollow">Forbes interview</a> discussing the AWS outage that caused mayhem across the internet.</p><p class="paragraph" style="text-align:left;">Here I am on <a class="link" href="https://www.ntd.com/tips-for-protecting-your-family-from-hacks-and-scams_1096723.html?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=58-the-paris-heist" target="_blank" rel="noopener noreferrer nofollow">NTD News</a> and <a class="link" href="https://www.fox32chicago.com/video/1730697?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=58-the-paris-heist" target="_blank" rel="noopener noreferrer nofollow">Fox 32 Chicago</a> speaking about Spies, Lies, and Cybercrime and tips to protect yourself and your family from cybercriminals. </p><p class="paragraph" style="text-align:left;">And finally, in an Interview with the New York Post talking about what the CIA’s covert operations in Venezuela might mean.</p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/NeCxzOihURc" width="100%"></iframe><hr class="content_break"><h1 class="heading" style="text-align:left;" id="ai-trend-of-the-week"><b>AI Trend of the Week</b></h1><h2 class="heading" style="text-align:left;" id="cats-with-guns">Cats. With guns.</h2><p class="paragraph" style="text-align:left;">It’s the latest AI fever dream—hyper-realistic, cinematic felines armed to the teeth, spreading from Sora to TikTok and Instagram like digital wildfire.</p><p class="paragraph" style="text-align:left;">AI keeps blurring the line between creativity and absurdity. So, what do you think—brilliant satire, or the moment we officially lost the plot?</p><blockquote align="center" class="instagram-media"><a href="https://www.instagram.com/p/DQRro1ACIPl/?img_index=6&igsh=MTE4Z2o0M3JxNXpvNw%3D%3D&utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=58-the-paris-heist"><p dir="ltr" lang="en"> Instagram post </p></a></blockquote><hr class="content_break"><h3 class="heading" style="text-align:left;" id="realtime-user-onboarding-zero-engin">Realtime User Onboarding, Zero Engineering</h3><div class="image"><a class="image__link" href="https://www.quarterzip.ai/?utm_source=beehiv&utm_medium=paid&utm_campaign={{publication_alphanumeric_id}}&utm_term=v1-p-cta&_bhiiv=opp_60b05ae1-bfa5-499e-80fc-bef868dc5357_e6e4e925&bhcl_id=c7ae10ce-49b5-4db7-b426-7a5283ca2a4e_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/35e52d14-202a-4a3c-a15e-2b520a0e9f10/Verison_A1_-_primary.png?t=1759888685"/></a></div><p class="paragraph" style="text-align:left;">Quarterzip delivers realtime, AI-led onboarding for every user with zero engineering effort.</p><p class="paragraph" style="text-align:left;">✨ <a class="link" href="https://www.quarterzip.ai/?utm_source=beehiv&utm_medium=paid&utm_campaign={{publication_alphanumeric_id}}&utm_term=v1-p-cta&_bhiiv=opp_60b05ae1-bfa5-499e-80fc-bef868dc5357_e6e4e925&bhcl_id=c7ae10ce-49b5-4db7-b426-7a5283ca2a4e_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Dynamic Voice</a> guides users in the moment<br>✨ <a class="link" href="https://www.quarterzip.ai/?utm_source=beehiv&utm_medium=paid&utm_campaign={{publication_alphanumeric_id}}&utm_term=v1-p-cta&_bhiiv=opp_60b05ae1-bfa5-499e-80fc-bef868dc5357_e6e4e925&bhcl_id=c7ae10ce-49b5-4db7-b426-7a5283ca2a4e_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Picture-in-Picture</a> stay visible across your site and others<br>✨ Guardrails keep things accurate with smooth handoffs if needed</p><p class="paragraph" style="text-align:left;">No code. No engineering. Just onboarding that adapts as you grow.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.quarterzip.ai/?utm_source=beehiv&utm_medium=paid&utm_campaign={{publication_alphanumeric_id}}&utm_term=v1-p-cta&_bhiiv=opp_60b05ae1-bfa5-499e-80fc-bef868dc5357_e6e4e925&bhcl_id=c7ae10ce-49b5-4db7-b426-7a5283ca2a4e_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">See how it works</a></p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="praise-for-spies-lies-and-cybercrim"><span style="font-family:Helvetica;"><b>Praise for Spies, Lies, and Cybercrime!</b></span></h1><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/78e98dff-7972-4401-9a7d-d3f1441a618e/David_Preiss.png?t=1761577187"/></div><p class="paragraph" style="text-align:left;">&quot;O’Neill deftly attests [that] taking proper precautions can limit, if not halt, the damage wrought by unscrupulous cybercriminals. <b>His masterful book </b>serves as an important guide for individuals and companies committed to avoiding an epic misstep.&quot; — Booklist</p><p class="paragraph" style="text-align:left;"><b>“One breach can sink a business—or a billion-dollar idea.” </b>—Marc Randolph, Co-Founder and First CEO of Netflix</p><p class="paragraph" style="text-align:left;"><b>“A chilling and essential wake-up call that reads like a thriller, but every word is terrifyingly real.”</b> –Brad Thor, #1 New York Times bestselling author of Edge of Honor</p><h1 class="heading" style="text-align:left;" id="preorder-spies-lies-and-cybercrime">Order Spies, Lies, and Cybercrime</h1><p class="paragraph" style="text-align:left;">I hope you love the book as much as I loved writing it for you! Please leave a review. Great reviews help others find the book. </p><p class="paragraph" style="text-align:left;">📚 Get the book: <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=58-the-paris-heist" target="_blank" rel="noopener noreferrer nofollow">https://ericoneill.net/books/spies_and_lies/</a></p><p class="paragraph" style="text-align:left;">📺 Review the Book: <a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=58-the-paris-heist" target="_blank" rel="noopener noreferrer nofollow">https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/</a></p><p class="paragraph" style="text-align:left;">🎤 Book me to speak at your next event: <a class="link" href="https://www.bigspeak.com/speakers/eric-oneill?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=58-the-paris-heist" target="_blank" rel="noopener noreferrer nofollow">https://www.bigspeak.com/speakers/eric-oneill</a></p><hr class="content_break"><h3 class="heading" style="text-align:left;" id="like-what-youre-reading"><b>Like What You&#39;re Reading?</b></h3><p class="paragraph" style="text-align:left;">Don’t miss a newsletter! <a class="link" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=58-the-paris-heist" target="_blank" rel="noopener noreferrer nofollow">Subscribe</a> to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=58-the-paris-heist"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><h2 class="heading" style="text-align:left;" id="lets-make-sure-my-emails-land-strai"><b>Let&#39;s make sure my emails land straight in your inbox.</b></h2><p class="paragraph" style="text-align:left;"><b>Gmail users: </b>Move this email to your primary inbox</p><p class="paragraph" style="text-align:left;"><b>On your phone? </b>Hit the 3 dots at top right corner, click &quot;Move to&quot; then &quot;Primary.&quot;</p><p class="paragraph" style="text-align:left;"><b>On desktop?</b> Close this email then drag and drop this email into the &quot;Primary&quot; tab near the top left of your screen</p><p class="paragraph" style="text-align:left;"><b>Apple mail users: </b>Tap on our email address at the top of this email (next to &quot;From:&quot; on mobile) and click “Add to VIPs”<br><br><b>For everyone else: </b><a class="link" href="https://blog.beehiiv.com/p/safelist-newsletter-senders-popular-email-services?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=58-the-paris-heist" target="_blank" rel="noopener noreferrer nofollow">follow these instructions</a></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=12c9e906-93e5-49e3-9d82-ab7000d10da5&utm_medium=post_rss&utm_source=spies_lies_cybercrime">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>57: The Bitcoin Heist</title>
  <description>Spies, Lies &amp; Cybercrime by Eric O&#39;Neill</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/605c6d6b-1915-45b5-b0bc-7d7760ce3b35/The_Bitcoin_Heist.png" length="1333764" type="image/png"/>
  <link>https://spies-lies-cybercrime.ericoneill.net/p/the-bitcoin-heist</link>
  <guid isPermaLink="true">https://spies-lies-cybercrime.ericoneill.net/p/the-bitcoin-heist</guid>
  <pubDate>Tue, 21 Oct 2025 13:01:33 +0000</pubDate>
  <atom:published>2025-10-21T13:01:33Z</atom:published>
    <dc:creator>Eric ONeill</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b><a class="link" href="#title-story" rel="noopener noreferrer nofollow">Title Story: </a></b>An elderly man’s trust is weaponized in <b>“The Crypto ATM Con,”</b> where fear, authority, and a glowing orange machine turn a savings account into digital smoke.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#cybersecurity-breach-of-the-week" rel="noopener noreferrer nofollow">Cybersecurity Breach of the Week: </a></b>Chinese crime syndicates are behind the flood of fake toll and USPS texts, stealing over a billion dollars by turning your credit card data into iPhones, gift cards, and global profit.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#cybersecurity-tip-of-the-week" rel="noopener noreferrer nofollow">Cybersecurity Tip of the Week:</a></b><a class="link" href="#cybersecurity-tip-of-the-week" rel="noopener noreferrer nofollow"> </a>How to spot and stop “toll trolls” — simple steps to block scam texts, secure your cards, and keep your money out of criminal hands.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="#appearance-of-the-week" rel="noopener noreferrer nofollow">Appearance of the Week:</a></b><a class="link" href="#appearance-of-the-week" rel="noopener noreferrer nofollow"> </a>I joined CNN last week to discuss deepfakes, online scams and how to keep yourself safe online</p><p class="paragraph" style="text-align:left;"><a class="link" href="#ai-trend-of-the-week" rel="noopener noreferrer nofollow">AI Trend Of the Week</a>: AI brings an iconic hacker to life to provide a PSA about trust and deception. </p></div><h1 class="heading" style="text-align:left;" id="spies-lies-and-cybercrime">Spies, Lies, and Cybercrime </h1><h2 class="heading" style="text-align:left;" id="love-the-newsletter-get-the-bestsel">Love the Newsletter? Get the bestselling book!</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/de46b3ad-e2aa-44c9-9900-3ed7fefeef2f/bestseller.png?t=1760720762"/></div><p class="paragraph" style="text-align:left;">Thanks to all of you, my book, <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=57-the-bitcoin-heist" target="_blank" rel="noopener noreferrer nofollow">Spies, Lies, and Cybercrime</a>, is an <a class="link" href="https://www.usatoday.com/booklist/books/spies-lies-and-cybercrime-cybersecurity-tactics-to-outsmart-hackers-and-disarm-scammers/9780063398177/2025-10-15?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=57-the-bitcoin-heist" target="_blank" rel="noopener noreferrer nofollow">instant national bestseller</a> and an <a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=57-the-bitcoin-heist" target="_blank" rel="noopener noreferrer nofollow">Amazon #1 Bestseller</a>.</p><ol start="1"><li><p class="paragraph" style="text-align:left;">f you haven’t already, please buy <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=57-the-bitcoin-heist#order" target="_blank" rel="noopener noreferrer nofollow">SPIES, LIES, AND CYBERCRIME</a>. If you already have, <i><b>thank you</b></i>, and please consider gifting some to friends and colleagues. It makes a perfect holiday gift for anyone you want to protect from cyber scams. </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.amazon.com/review/create-review/?ie=UTF8&channel=glance-detail&asin=0063398176&utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=57-the-bitcoin-heist" target="_blank" rel="noopener noreferrer nofollow">Leave a 5-star review on Amazon</a>. Reviews are the secret weapon that triggers Amazon’s algorithm to share the book with thousands of new readers who might not otherwise find it — and might otherwise fall prey to an attack.</p></li><li><p class="paragraph" style="text-align:left;">Please share! Forward this email to your friends and family. Here&#39;s an easy-to-post <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=57-the-bitcoin-heist" target="_blank" rel="noopener noreferrer nofollow">cover graphic</a>, here&#39;s a <a class="link" href="https://www.linkedin.com/pulse/spies-lies-cybercrime-five-lessons-from-book-eric-o-neill-l6l3e/?trackingId=A1cDw4nCjJmOs87%2B4v2ZFA%3D%3D&utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=57-the-bitcoin-heist" target="_blank" rel="noopener noreferrer nofollow">Linkedin post</a>, here&#39;s an <a class="link" href="https://www.instagram.com/reel/DPuhA8ckqMB/?utm_source=ig_web_copy_link&igsh=MzRlODBiNWFlZA==" target="_blank" rel="noopener noreferrer nofollow">IG reel </a>and a <a class="link" href="https://www.instagram.com/p/DOos4ptgW_2/?utm_source=ig_web_copy_link&igsh=MzRlODBiNWFlZA==" target="_blank" rel="noopener noreferrer nofollow">post</a>.</p></li><li><p class="paragraph" style="text-align:left;">Want a <b>SIGNED COPY</b>? <a class="link" href="http://www.kensingtonrowbookshop.com?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=57-the-bitcoin-heist" target="_blank" rel="noopener noreferrer nofollow">Get one here</a>.</p></li></ol><p class="paragraph" style="text-align:left;">Now back to our regularly scheduled NEWSLETTER!</p><p class="paragraph" style="text-align:left;">—Eric</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="title-story">Title Story</h1><h2 class="heading" style="text-align:left;" id="scamtoberfest-vol-2-the-bitcoin-hei">Scamtoberfest Vol. 2: The Bitcoin Heist</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/605c6d6b-1915-45b5-b0bc-7d7760ce3b35/The_Bitcoin_Heist.png?t=1760721979"/></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Jeremy was eighty-one years old and proud of his independence. He balanced his own checkbook, paid his bills at the kitchen table, and visited the same neighborhood bank every Friday. He’d never fallen for a scam—not once.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">One morning his phone rang.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">“Mr. Whitmore, this is </span><span style="font-family:Helvetica;"><i>Daniel Foster</i></span><span style="font-family:Helvetica;"> from your bank’s fraud department,” said the calm, professional voice on the line. “We’ve detected suspicious activity in your account — possible money laundering tied to drug smuggling.”</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Jeremy’s heart kicked hard in his chest. “That can’t be right,” he said.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">“I believe you, sir,” the man replied. “You’re not under investigation. But your account is. If we don’t act immediately, federal authorities could freeze your funds. I’m going to help you move your money to a secure government wallet while we clear your name. You just have to follow my instructions.”</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">It sounded official, urgent, and safe.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">The man told Jeremy to go straight to his bank and withdraw his entire savings account, all $18,000. “Don’t mention this call to anyone,” he said. “The branch itself could be compromised. If a teller asks questions, say you’re paying for home renovations.”</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Jeremy complied. Fear does that.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">He kept the “specialist” on speakerphone the entire time—in the car, in the teller line, all the way back home. When he returned, the man asked him to take a photo of the cash and text it to a number for “verification.”</span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/002bbcc9-d0d4-47fd-9d1a-70e3b497f0dd/old_man.png?t=1760734583"/></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Jeremy did. Within seconds, the man texted back: “Perfect. Now let’s secure those funds. There’s a Bitcoin ATM inside the QuickMart on Route 7. Drive there now. I’ll stay on the line and guide you.”</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">The voice never wavered. It was calm. Authoritative. Reassuring.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">As Jeremy drove, the man explained that traditional wire transfers were unsafe—that hackers could intercept them. Only cryptocurrency, he said, could guarantee protection.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">At the QuickMart, Jeremy found the glowing orange kiosk just where the man said it would be. The “specialist” texted him a QR code and told him to scan it. Jeremy followed each instruction exactly: insert the cash, one stack at a time; scan the code; confirm the amount.</span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/5f484384-b58e-40e2-a071-aca0e12d30ba/image.png?t=1760734618"/></div><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://spies-lies-cybercrime.ericoneill.net/subscribe?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=57-the-bitcoin-heist"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">The machine beeped. </span><span style="font-family:Helvetica;"><i>Transaction Complete.</i></span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">“Excellent,” the man said. “Your funds are now secure. Stay by your phone for confirmation.”</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Then the line went dead.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Jeremy waited an hour. Then two. He called back. The number was disconnected.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">He finally phoned his real bank. After a long pause, the woman in the fraud department said gently, “Mr. Whitmore, we don’t have anyone named Daniel Foster. And we would never ask you to use a Bitcoin ATM.”</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">Jeremy didn’t respond. He didn’t have to. He already knew.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Helvetica;">He hadn’t secured his money. He’d handed it away. Every dollar.</span></p><h3 class="heading" style="text-align:left;" id="the-anatomy-of-a-modern-scam">The Anatomy of a Modern Scam</h3><p class="paragraph" style="text-align:left;">Jeremy’s story follows the same pattern that’s sweeping the country:</p><ul><li><p class="paragraph" style="text-align:left;"><b>Create urgency and fear.</b> Scammers claim a bank account is linked to criminal activity or under investigation.</p></li><li><p class="paragraph" style="text-align:left;"><b>Control the conversation.</b> They keep victims on the line, feeding instructions and isolating them from anyone who might intervene.</p></li><li><p class="paragraph" style="text-align:left;"><b>Direct to a crypto ATM. </b>The victim withdraws cash, drives to a convenience store or gas station, and deposits it into a machine.</p></li><li><p class="paragraph" style="text-align:left;"><b>Scan the scammer’s QR code.</b> The funds go directly to an anonymous digital wallet where they are gone forever.</p></li></ul><p class="paragraph" style="text-align:left;">In 2024 alone, the FBI received nearly 11,000 complaints involving crypto ATMs, totaling over $246 million in losses. The FTC reports another $65 million lost in just the first half of the year. Most of it lost by older Americans like Jeremy.</p><h3 class="heading" style="text-align:left;" id="how-to-avoid-the-crypto-atm-trap">How to Avoid the Crypto ATM Trap</h3><ol start="1"><li><p class="paragraph" style="text-align:left;"><b>No legitimate authority will ask for payment in crypto.</b> If anyone claims to be from your bank, the IRS, or law enforcement and directs you to a Bitcoin ATM, hang up immediately.</p></li><li><p class="paragraph" style="text-align:left;"><b>Don’t act under pressure.</b> Scammers use fear to make you move fast. Real financial institutions don’t threaten arrest or frozen accounts over the phone.</p></li><li><p class="paragraph" style="text-align:left;"><b>Confirm the caller. </b>Hang up and call your bank or agency directly using a known, official number. Not one texted or provided during the call.</p></li><li><p class="paragraph" style="text-align:left;"><b>Don’t scan QR codes from strangers.</b> That “secure wallet” address belongs to the thief.</p></li><li><p class="paragraph" style="text-align:left;"><b>Report it immediately.</b> If you or someone you know falls victim, file a complaint at <a class="link" href="https://IC3.gov?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=57-the-bitcoin-heist" target="_blank" rel="noopener noreferrer nofollow">IC3.gov</a> (FBI) or <a class="link" href="https://ReportFraud.FTC.gov?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=57-the-bitcoin-heist" target="_blank" rel="noopener noreferrer nofollow">ReportFraud.FTC.gov</a>. In some states, like Iowa, you may be entitled to a refund from the ATM operator if you act quickly.</p></li></ol><hr class="content_break"><h1 class="heading" style="text-align:left;" id="cybersecurity-breach-of-the-week">Cybersecurity Breach of the Week</h1><h2 class="heading" style="text-align:left;" id="those-toll-texts-arent-what-they-se">Those Toll Texts Aren’t What They Seem</h2><p class="paragraph" style="text-align:left;">We’ve all gotten them—the “past-due toll,” “USPS delivery fee,” or “unpaid ticket” texts that pop up like digital gnats. Turns out, they’re not random spam but part of a billion-dollar criminal enterprise run out of China. </p><p class="paragraph" style="text-align:left;">Over the past three years, investigators say these scams have siphoned off <b>more than $1 billion</b> by tricking victims into handing over their credit card details. The stolen data is loaded into mobile wallets in Asia, bypassing multi-factor authentication, and then shared with gig workers in the U.S. who buy iPhones, luxury goods, and gift cards. Those goods get shipped to China and resold—laundered clean, one fraudulent purchase at a time.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/79975e33-0841-42c7-8988-d09ed490f1c1/sim-swat-sec.jpg.jpg?t=1760735070"/><div class="image__source"><span class="image__source_text"><p>SIM Farm. Source: Wired Magazine</p></span></div></div><p class="paragraph" style="text-align:left;">Behind the flood of fake toll messages are “SIM farms,” warehouses stacked with thousands of SIM cards that can send millions of texts a day. DHS investigators have found these setups across U.S. cities, operated remotely but built locally by gig workers recruited over apps like WeChat. It’s an industrial-scale cyber hustle powered by social engineering and clever tech manipulation—one that shows how a simple text can be the front line of global organized cybercrime.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://spies-lies-cybercrime.ericoneill.net/subscribe?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=57-the-bitcoin-heist"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><hr class="content_break"><h1 class="heading" style="text-align:left;" id="cybersecurity-tip-of-the-week">Cybersecurity Tip of the Week </h1><h2 class="heading" style="text-align:left;" id="dont-pay-the-toll-trolls">Don’t Pay the Toll Trolls</h2><ol start="1"><li><p class="paragraph" style="text-align:left;"><b>Never click payment links in texts or emails. </b>If you think you owe a toll, open the agency’s official website or app directly.</p></li><li><p class="paragraph" style="text-align:left;"><b>Ignore the “urgency.” </b>Real agencies don’t threaten account suspension over text. Scammers count on panic to override common sense.</p></li><li><p class="paragraph" style="text-align:left;"><b>Lock down your cards. </b>Use banks that offer virtual or single-use card numbers, and enable alerts for every purchase.</p></li><li><p class="paragraph" style="text-align:left;"><b>Protect your digital wallet.</b> If a site ever asks for a one-time password (OTP) outside your bank’s app, stop—that’s a theft in progress.</p></li><li><p class="paragraph" style="text-align:left;"><b>Report and delete.</b> Forward scam texts to 7726 (SPAM) to help carriers block future campaigns.</p></li></ol><p class="paragraph" style="text-align:left;">Are you beginning to see the trends with Scamtoberfest scams? Attackers are using traditional espionage tactics of deception, impersonation and pushing victims into pressure situations that short circuit rational thought. The number one tip I have to avoid these scams is to be aware of them in the first place. Number two? Avoid the pressure situation. </p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="appearance-of-the-week">Appearance of the Week</h1><p class="paragraph" style="text-align:left;">I joined CNN last week to discuss deepfakes, online scams and how to keep yourself safe online. We also discuss how to protect children online from bullying, exploitation and extortion in a connected world.</p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/nykNvM0K6_4" width="100%"></iframe><h3 class="heading" style="text-align:left;" id="spies-lies-and-cybercrime-gets-a-wi">Spies, Lies, and Cybercrime Gets a Window in Manhattan</h3><p class="paragraph" style="text-align:left;">I also traveled to New York City last week to sign books at the Barnes & Noble on 5th Avenue in Manhattan. Here are some images from the event, including the window for the book! Cool, right? If you’re in Manhattan, send me pictures of you in front of the window.</p><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/4869967e-11b0-4503-b5e4-322a0a4273ca/IMG_7650.jpeg?t=1760735593"/><div class="image__source"><span class="image__source_text"><p>Outside the window.</p></span></div></div></td><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/a34aa27d-a451-4759-bc56-3c57523f5d95/IMG_5289.jpeg?t=1760735613"/><div class="image__source"><span class="image__source_text"><p>Signing books!</p></span></div></div></td></tr></table><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/d2dd45bd-b418-4701-81d6-41866845a9b5/IMG_7663.jpeg?t=1760735623"/><div class="image__source"><span class="image__source_text"><p>She’s reading about Imposter scams.</p></span></div></div></td><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/2e6c576b-4331-4a04-9ded-3ff42e60a898/IMG_7659.jpeg?t=1760735629"/><div class="image__source"><span class="image__source_text"><p>Signed by the author 😀 </p></span></div></div></td></tr></table><hr class="content_break"><h1 class="heading" style="text-align:left;" id="ai-trend-of-the-week"><b>AI Trend of the Week</b></h1><p class="paragraph" style="text-align:left;">A quick word about trust by an AI generated video, made from an AI generated image of a hacker using Sora 2. </p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/-h1cFYE3wak" width="100%"></iframe><hr class="content_break"><h3 class="heading" style="text-align:left;" id="the-game-is-changing">The Game is Changing</h3><div class="image"><a class="image__link" href="https://www.beehiiv.com/winter-release-2025?utm_medium=cpc&utm_source=beehiiv_ad_network&utm_content=V2-Serious&utm_source_platform=newsletter&via=beehiiv-ad-network-wp&utm_campaign=WRE2025-{{publication_alphanumeric_id}}-{{publication_name_param}}&utm_term=CPC&_bhiiv=opp_4c6c9974-a8be-4017-b566-3562b1dc1eb9_94162826&bhcl_id=b56bcb72-3dc0-4e51-88c4-deb38a8099c7_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/b2e37b5a-4799-44e6-9a26-ec86ff40eba8/image__1_.png?t=1760035120"/></a></div><p class="paragraph" style="text-align:left;">The internet was supposed to make it easier to build and connect. Somewhere along the way, we lost the plot. </p><p class="paragraph" style="text-align:left;">beehiiv is changing that once and for all.</p><p class="paragraph" style="text-align:left;">On <b>November 13</b>, they’re unveiling what’s next at their first-ever <a class="link" href="https://www.beehiiv.com/winter-release-2025?utm_medium=cpc&utm_source=beehiiv_ad_network&utm_content=V2-Serious&utm_source_platform=newsletter&via=beehiiv-ad-network-wp&utm_campaign=WRE2025-{{publication_alphanumeric_id}}-{{publication_name_param}}&utm_term=CPC&_bhiiv=opp_4c6c9974-a8be-4017-b566-3562b1dc1eb9_94162826&bhcl_id=b56bcb72-3dc0-4e51-88c4-deb38a8099c7_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Winter Release Event</a>. For the people shaping the future of content, community, and media, this is an event you can’t miss. </p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.beehiiv.com/winter-release-2025?utm_medium=cpc&utm_source=beehiiv_ad_network&utm_content=V2-Serious&utm_source_platform=newsletter&via=beehiiv-ad-network-wp&utm_campaign=WRE2025-{{publication_alphanumeric_id}}-{{publication_name_param}}&utm_term=CPC&_bhiiv=opp_4c6c9974-a8be-4017-b566-3562b1dc1eb9_94162826&bhcl_id=b56bcb72-3dc0-4e51-88c4-deb38a8099c7_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">RSVP today</a></p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="praise-for-spies-lies-and-cybercrim"><span style="font-family:Helvetica;"><b>Praise for Spies, Lies, and Cybercrime!</b></span></h1><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/3ad871ea-372e-4a24-8ce1-1f393a2f0ee7/14DDF795-0201-4AEE-8C2A-A825A38F5266.jpg?t=1760735363"/></div><p class="paragraph" style="text-align:left;">&quot;O’Neill deftly attests [that] taking proper precautions can limit, if not halt, the damage wrought by unscrupulous cybercriminals. <b>His masterful book </b>serves as an important guide for individuals and companies committed to avoiding an epic misstep.&quot; — Booklist</p><p class="paragraph" style="text-align:left;"><b>“One breach can sink a business—or a billion-dollar idea.” </b>—Marc Randolph, Co-Founder and First CEO of Netflix</p><p class="paragraph" style="text-align:left;"><b>“A chilling and essential wake-up call that reads like a thriller, but every word is terrifyingly real.”</b> –Brad Thor, #1 New York Times bestselling author of Edge of Honor</p><p class="paragraph" style="text-align:left;"><b>“An astonishingly up-to-date review of the tools and techniques used by criminal hackers…O’Neill will have you on the edge of your seat.” </b>—Marc Goodman, New York Times bestselling author of Future Crimes</p><p class="paragraph" style="text-align:left;"><b>Spies, Lies, and Cybercrime is a must-read that will open your eyes and will change how you think about trust, technology, and the threats we face.&quot;</b> --Jenn Donahue, Author: Becoming The Warrior, award-winning Engineer, Keynote Speaker, US Navy Captain (ret), Entrepreneur</p><h1 class="heading" style="text-align:left;" id="preorder-spies-lies-and-cybercrime">Order Spies, Lies, and Cybercrime</h1><p class="paragraph" style="text-align:left;">I hope you love the book as much as I loved writing it for you! Please leave a review. Great reviews help others find the book. </p><p class="paragraph" style="text-align:left;">📚 Get the book: <a class="link" href="https://ericoneill.net/books/spies_and_lies/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=57-the-bitcoin-heist" target="_blank" rel="noopener noreferrer nofollow">https://ericoneill.net/books/spies_and_lies/</a></p><p class="paragraph" style="text-align:left;">📺 Review the Book: <a class="link" href="https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=57-the-bitcoin-heist" target="_blank" rel="noopener noreferrer nofollow">https://www.amazon.com/Spies-Lies-Cybercrime-Cybersecurity-Outsmart/dp/0063398176/</a></p><p class="paragraph" style="text-align:left;">🎤 Book me to speak at your next event: <a class="link" href="https://www.bigspeak.com/speakers/eric-oneill?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=57-the-bitcoin-heist" target="_blank" rel="noopener noreferrer nofollow">https://www.bigspeak.com/speakers/eric-oneill</a></p><hr class="content_break"><h3 class="heading" style="text-align:left;" id="like-what-youre-reading"><b>Like What You&#39;re Reading?</b></h3><p class="paragraph" style="text-align:left;">Don’t miss a newsletter! <a class="link" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=57-the-bitcoin-heist" target="_blank" rel="noopener noreferrer nofollow">Subscribe</a> to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.ericoneill.net/newsletter?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=57-the-bitcoin-heist"><span class="button__text" style=""> Subscribe for Weekly Intel </span></a></div><h2 class="heading" style="text-align:left;" id="lets-make-sure-my-emails-land-strai"><b>Let&#39;s make sure my emails land straight in your inbox.</b></h2><p class="paragraph" style="text-align:left;"><b>Gmail users: </b>Move this email to your primary inbox</p><p class="paragraph" style="text-align:left;"><b>On your phone? </b>Hit the 3 dots at top right corner, click &quot;Move to&quot; then &quot;Primary.&quot;</p><p class="paragraph" style="text-align:left;"><b>On desktop?</b> Close this email then drag and drop this email into the &quot;Primary&quot; tab near the top left of your screen</p><p class="paragraph" style="text-align:left;"><b>Apple mail users: </b>Tap on our email address at the top of this email (next to &quot;From:&quot; on mobile) and click “Add to VIPs”<br><br><b>For everyone else: </b><a class="link" href="https://blog.beehiiv.com/p/safelist-newsletter-senders-popular-email-services?utm_source=spies-lies-cybercrime.ericoneill.net&utm_medium=newsletter&utm_campaign=57-the-bitcoin-heist" target="_blank" rel="noopener noreferrer nofollow">follow these instructions</a></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=aaa65067-cbf2-4914-a3d9-9c63236414b9&utm_medium=post_rss&utm_source=spies_lies_cybercrime">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

  </channel>
</rss>
