32: Battlefield: Space

Spies, Lies & Cybercrime by Eric O'Neill

In This Issue

Title Story: The Day The Lights Went Dark: Russia and China are developing weapons in space. How close are we to a nuclear war in the final frontier?

Cybersecurity Tip of the Week: How to tell if your phone has been hacked.

Cybersecurity Breach of the Week: Your social security number is for sale on the dark web. What can you do about it?

Tech of the Week: Can AI help us finally talk to dolphins? Google thinks so!

Appearance of the Week: Eric on Stage at the Pure Leadership Forum in Nashville

AI Image of the Week: I jump on the new AI trend - what would my dog look like as a person?

THE DAY THE LIGHTS WENT DARK

Imagine you’re on your porch at sunrise, cradling a hot cup of coffee and enjoying the quiet before the world wakes up. Then a flicker catches your eye—a flash at the edge of the atmosphere. It looks like a meteor, but something’s off. It’s too bright. Too fast. Too silent.

Seconds later, your phone dies.

The porch light flickers, then fades. Down the street, car alarms sputter and fall silent. A delivery truck rolls to a stop. The driver steps out, key fob useless, scanning the sky like he just stepped into a different reality.

You check your phone again. Still dead. So is the car. The house. Everything.

This isn’t the end of the world—but it is the end of the way the world works. And if you’ve just witnessed what I think you have—a high-altitude electromagnetic pulse, or EMP—you’re living through more than a blackout. That flash didn’t just trip a breaker. It burned the grid, silenced the sky, and severed every digital lifeline we depend on.

I know it sounds dramatic. Apocalyptic. But in my world, I’ve seen enough disasters to know the quiet ones—the ones that start with a blink, not a bang—are the ones that change everything. And as we edge closer to weaponizing space, that quiet flash could become reality. Because space is no longer just a frontier. It’s a battlefield.

ORBITAL WARFARE IS NO LONGER SCI-FI

Russia is actively developing a nuclear weapon for space—designed not to target cities, but to destroy satellites and trigger an EMP that could paralyze vast regions below. It violates the spirit of the 1967 Outer Space Treaty, but that treaty lacks enforcement, and Russia’s ambition is clear.

They’re not alone.

China is rapidly assembling what’s been described as a “kill mesh”—a coordinated network of satellites designed to jam, disable, or destroy others. If paired with a nuclear EMP device, the results could be catastrophic. First, they blind the world. Then they pull the plug.

This isn’t just a new strategic capability. It’s checkmate before the other side even knows the game has started.

And here’s the uncomfortable truth: the United States no longer holds exclusive control over space tech. Commercial companies have caught up. Global rivals are building fast. The high ground isn’t just contested—it’s congested, vulnerable, and increasingly hostile.

THE VULNERABILITY NO ONE WANTS TO FACE

If an EMP detonates in orbit, satellites are the first to go—but the damage doesn’t stop there.

No GPS. No communications. No air traffic control. No trading on Wall Street. Power grids collapse. Hospitals lose critical systems. Supply chains freeze. Your Uber? Gone. Your bank? Offline. Your city? Paralyzed.

A deliberate strike could disable entire constellations of satellites—civilian and military alike. GPS failures alone would throw aviation, naval fleets, and battlefield coordination into chaos. Think about the last time you used a navigation app to find a coffee shop. Without satellites, you might be lost in your own neighborhood—just the lighthearted tip of an extremely dangerous iceberg.

And then comes the debris.

A detonation in space creates a storm of high-velocity shrapnel—each piece moving faster than a bullet. One collision triggers another. Soon, Earth’s orbit becomes a shooting gallery. This is Kessler Syndrome: a runaway cascade of collisions that could render low Earth orbit unusable for decades. No more communications. No weather tracking. No Moon base. No Mars.

All from one flash.

Possessing the ability to launch an EMP from space is the ultimate preemptive strike—a silver bullet for disabling an adversary before the conflict even reaches the ground. It’s not science fiction. It’s a real, growing capability. And if we’re not paying attention, the lights won’t just go out—they’ll stay out.

GOLDEN DOME: ONE POSSIBLE SOLUTION ABOVE OUR HEADS

There is a way forward—and we’re not starting from scratch.

One promising solution already underway is the United States’ Golden Dome for America—a Space Force-led initiative aimed at building a fully integrated, layered space defense system. The idea isn’t to invent new weapons. It’s to connect what we already have: satellites, sensors, and ground systems that—until now—have operated in silos.

Golden Dome aims to fuse those systems into a single, coordinated network that can detect threats in orbit, respond in real time, and recover quickly. It leverages existing military assets, commercial technologies, and allied capabilities, creating redundancy through collaboration. Instead of a fragile system with a few critical nodes, we build a web—more resilient, harder to take down, and far more capable.

This strategy isn’t about dominating space. It’s about protecting it. And it may be our best near-term bet for preventing catastrophe. But even Golden Dome isn’t enough on its own.

The real solution is bigger: a modern, enforceable space treaty—one built on the backbone of the technologies Golden Dome is starting to integrate. We need agreements that reflect today’s realities, ban weapons like Russia’s orbital nukes and China’s kill mesh, and mandate transparency across all launches and orbital operations.

Space was never meant to be a war zone. It was meant to unite us—to explore, to discover, to inspire. We still have time to steer things back in that direction. But we must act quickly. Strategically. Together.

Because the next great war doesn’t have to be fought above our heads. And if we’re smart, it won’t be.

Cybersecurity Tip of the Week

Is Your Phone Working for You—or for a Hacker?

Cybercriminals don’t just want your data—they want the device that holds your life. Our phones are vaults: banking apps, passwords, personal photos, emails, contacts, even two-factor authentication codes. That makes them prime targets. And once a bad actor breaches your phone, they’re not just spying—they’re operating in your pocket.

Here’s how to hunt for signs your digital companion has been compromised:

1. Battery draining fast?

Spyware runs constantly in the background. If your fully charged phone burns out by lunch, you might not just be scrolling too much.

2. Overheating with light use?

If your phone gets hot while idle or during basic tasks, it may be working overtime for someone else.

3. Pop-ups from hell?

Excessive ads or strange pop-ups (especially on the lock screen) are signs of adware or malicious apps.

4. Apps you didn’t install?

If new apps show up that you don’t recognize—and didn’t authorize—they may be part of a stealth install.

5. Sluggish performance or strange behavior?

Crashes, unresponsive screens, or odd texts sent from your number? Red flags. Especially if your settings change without your input.

What to Do

  • Delete unfamiliar apps immediately.

  • Run a reputable mobile security scan (Norton, Lookout, or Bitdefender).

  • Update your phone’s OS and apps regularly.

  • If things still look off, back up your data and do a full factory reset.

And most importantly—use strong passcodes and never click suspicious links, even from someone you know. When it comes to your phone, don’t just hold it—own it.

Cybersecurity Breach of the Week

My work as a threat hunter routinely takes me deep into the oppressive caverns of the dark web—places where cybercriminals trade in our most personal information like it’s currency. What I’ve seen lately is deeply alarming: Social Security accounts are being sold in bulk, complete with names, dates of birth, and even monthly benefit payment details.

This surge makes sense when you connect it to the massive, underreported national data breach that came to light between late 2023 and early 2024—a breach that exposed the Social Security numbers of over 270 million people, including both Americans and foreign nationals.

Here’s what these criminals do:

They steal your login credentials—usually through phishing or malware—access your SSA account, change your direct deposit info, and reroute your benefits into their own accounts. No masks, no vaults—just a few keystrokes and they’re stealing your retirement.

What You Can Do Now to Protect Yourself

1. Check your “my Social Security” account frequently - Watch for changes to your direct deposit info, contact details, or benefits status.

2. Enable two-factor authentication - Make it harder for someone to break in, even if they have your password.

3. Avoid phishing traps - Never click links in unsolicited texts or emails claiming to be from the SSA. Always go directly to ssa.gov.

4. Ignore threats from fake agents - Scammers posing as government officials may say your benefits are “at risk” and ask you to convert money into gift cards or gold. That’s a scam. Always.

5. Talk to someone you trust - If something feels off or rushed, pause and consult a friend, family member, or professional before acting.

6. Stay informed - Follow updates from the SSA, FCC, and other trusted sources like this Newsletter – Spies, Lies & Cybercrime - so you’re not blindsided by evolving threats.

The Social Security number was never designed to be a gatekeeper for our most sensitive identity data. It was a bookkeeping tool—not a fortress. In today’s digital age, it’s painfully outdated. And yet, we still use it as a master key.

We need something stronger.

One solution might be a next-generation Digital Identity Key—a secure, government-issued identity system that replaces the outdated Social Security number with a tokenized, biometric-backed, multi-factor credential. Built on a decentralized blockchain framework, this Digital Identity Key would be revocable, encrypted, and privacy-preserving, allowing individuals to verify their identity across institutions without ever exposing sensitive personal information. Think of it as a smart passport for the digital world—stored on your device, secured by your biometrics, and useless to anyone but you. It’s everything the SSN was never designed to be: secure, modern, and built for the world we actually live in.

Tech of the Week

What if I told you Google just built an AI model to help us talk to dolphins?

It’s real—and it’s called DolphinGemma.

This summer, researchers from the Wild Dolphin Project will field-test Google’s new open-source AI model, which has been trained on decades of underwater audio recordings from a specific group of Atlantic spotted dolphins. The goal? To decode dolphin vocalizations, identify consistent patterns, and maybe—just maybe—create a shared vocabulary between humans and one of the most intelligent species on the planet.

DolphinGemma runs on Pixel phones using compact field equipment and Google’s SoundStream audio tech. It tokenizes dolphin clicks and whistles the same way language models process words—then predicts the next sound. In theory, this means the model could begin to mimic or even generate dolphin-like vocalizations that carry meaning.

This doesn’t mean we’ll be having full conversations with Flipper by August—but it is a serious leap toward understanding non-human intelligence. If this works, it opens the door to broader interspecies communication, not just with dolphins, but potentially whales, elephants—and beyond.

A new kind of translator is coming. And it speaks fluent sonar.

Appearance of the Week

On Stage at Pure Leadership Forum in March 2025, Nashville, TN.

AI Image of the Week

Let’s keep the trends rolling. Last week, I introduced my custom ChatGPT 4.0 action figure—along with his arch-nemesis, Robert Hanssen. This week, we’re going from covert ops to canine companions.

Turn Your Dog into a Human — The Challenge

This is Moo - my brother’s dog - but we took care of Moo for nine months while my brother traveled - so close enough!

Moo in his Christmas Sweater looking somewhat bemused about the fit.

Moo as a human!

Here’s how I did this:

  1. Head to the ChatGPT app or website and log in.

  2. Click the and upload a clear photo of your dog.

  3. Under the image, type this prompt:

“Create an image that answers this question: what would my male/female dog look like as a person?”

(Make sure to choose the right gender.)

  1. Hit send. Let the transformation begin.

That’s it. Let’s see your dog’s human alter ego. Bonus points if they look like they work for the CIA.

Like What You're Reading?

Don’t miss a newsletter! Subscribe to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.

Are you protected?

Recently nearly 3 billion records containing all our sensitive data was exposed on the dark web for criminals, fraudsters and scammers to data mine for identity fraud. Was your social security number and birthdate exposed? Identity threat monitoring is now a must to protect yourself? Use this affiliate link to get up to 60% off of Aura’s Cybersecurity, Identity monitoring and threat detecting software!

Want to start a newsletter?

Use this Link to get a 30 days trial + 2-% Beehiiv!

Ready for Next Week?

What do YOU want to learn about in my next newsletter? Reply to this email or comment on the web version, and I’ll include your question in next month’s issue!

Thank you for subscribing to Spies, Lies and Cybercrime. Please comment and share the newsletter. I look forward to helping you stay safe in the digital world.

Best,
Eric

Let's make sure my emails land straight in your inbox.

Gmail users: Move this email to your primary inbox

On your phone? Hit the 3 dots at top right corner, click "Move to" then "Primary."

On desktop? Close this email then drag and drop this email into the "Primary" tab near the top left of your screen

Apple mail users: Tap on our email address at the top of this email (next to "From:" on mobile) and click “Add to VIPs”

For everyone else: follow these instructions

Partner Disclosure: Please note that some of the links in this post are affiliate links, which means if you click on them and make a purchase, I may receive a small commission at no extra cost to you. This helps support my work and allows me to continue to provide valuable content. I only recommend products that I use and love. Thank you for your support!

Reply

or to participate.