Title Story: Two spies betrayed America from opposite sides of the intelligence world—and when I asked Robert Hanssen what he thought of Aldrich Ames, his answer told me more about Hanssen than I was ready to hear.

Cybersecurity Tip of the Week: Your phone is a digital treasure chest, and cybercriminals are increasingly breaking into cloud accounts to steal private content and extort victims.

Technology News of the Week: TikTok’s “American deal” may solve the easy problem (data storage), but the real question is whether China still controls what the algorithm shows you.

Appearance of the Week: I joined Forcepoint’s To the Point podcast to break down the real limits of AI in cybersecurity—and why human judgment, verification, and creativity still matter as threats evolve faster than automation can keep up.

Title Story

A Tale of Two Spies

Aldrich Ames died in prison this month, ending the life of a man who helped inflict one of the most catastrophic intelligence collapses in American history. A CIA counterintelligence officer with deep access to sensitive operations, Ames sold U.S. secrets to the Soviets for years—names, methods, sources, and ongoing operations—while living far beyond his means and daring his agency to notice. In 1994, he was arrested, convicted, and sentenced to life without parole. He never saw freedom again. He died behind bars, exactly where a traitor belongs.

Aldrich Hazen Ames was arrested by the FBI in Arlington, Virginia on espionage charges on February 21, 1994.

Ames didn’t work alone in destroying national security. While Ames was gutting the CIA from the inside, Robert Hanssen was doing the same to the FBI. These two men—each betraying the nation in parallel, each unknown to the other—contributed to the loss of nearly every American asset inside the Soviet Union in 1984 and 1985, the height of the Cold War. Hanssen’s espionage went beyond selling secrets; he helped cripple America’s ability to catch spies at all. He exposed nuclear warfare secrets, continuity-of-government plans, identities of U.S. sources in Russia, compromised undercover operations and operatives, and most devastatingly, corroded the FBI’s counterintelligence capacity from the inside out. Ames blew holes in our intelligence. Hanssen helped teach the enemy exactly where to aim.

And here’s the part that still sticks with me: Hanssen didn’t respect Ames. Not even a little.

A Targeted Question for an Afternoon Stroll.

I had many conversations with Robert Hanssen. Some were professional: the overt work we both did to analyze and redesign cybersecurity for the FBI. Others were covert: careful questions phrased to sound harmless, designed to earn his trust while quietly searching for the smoking gun in the most sensitive counterintelligence investigation in the Bureau’s history. And some conversations were simply what happens when two men are locked in a secure room for eight to ten hours a day, trying to stay human.

One conversation fell into all three categories.

Hanssen was a devout Catholic and a committed member of Opus Dei. He went to Mass daily. Most mornings, he attended early services at his parish near his home in Vienna, Virginia. But on days he ran late—family chaos, oversleeping, or any of the reasons we use to justify missing what matters—he headed instead to the noon Mass at the Catholic Information Center, only a few blocks from FBI Headquarters.

To build trust with him, I went along.

Eric and Hanssen attending church as depicted in Universal Picture’s Breach (2007).

I’d bundle up against the January cold and walk beside him through downtown Washington. Those short trips became some of my most operationally useful moments with Hanssen. When you’re walking shoulder to shoulder, outside a secure room, people tend to talk more freely. Especially people who love to hear themselves talk.

One Wednesday, as we stepped off FBIHQ and turned from 9th Street toward the wide lanes of Pennsylvania Avenue, I took a risk—one of those questions that straddled the line between casual conversation and undercover probing.

“Hey, boss,” I said as we paused at the curb, waiting for the signal. “What do you think of Aldrich Ames?”

The question wasn’t out of bounds. Ames had eviscerated American security from inside the CIA, and Hanssen knew more about Russian espionage than anyone I’d ever met. Of course he’d have an opinion. Ames was his closest contemporary in the pantheon of American traitors.

Hanssen stopped and stared at me.

For a moment, I thought I’d pushed too far—tripped the wire between suspicion and paranoia that everyone in special operations learns to respect. Then his mouth curled into a thin, sarcastic smile.

“Ames,” he scoffed. “Aldrich Ames was a moron. A reprobate. A drunk. A loser.”

The walk signal flashed. We moved into the crosswalk, cutting across 9th Street toward Pennsylvania.

“Ames couldn’t stop putting drugs up his nose,” Hanssen continued. “No operational security. Spendthrift. The man couldn’t resist buying whatever he and his wife wanted.”

“Is that how he was caught?” I asked, even though I already knew.

Of course I knew. I joined the FBI as the Ames investigation was concluding. I’d worked around the agents who chased him, along with fellow spies Earl Pitts and Jim Nicholson.

But I never let Hanssen see the depth of my counterintelligence background. As far as he knew, I was a counterterrorism specialist—useful, smart, but out of my depth—helping him build counterintelligence into FBI cybersecurity. The mentor-mentee dynamic was effective. Hanssen liked being the expert in the room. And when he felt like the expert, he talked.

Including, apparently, trash-talking Aldrich Ames.

“They eventually caught Ames because he was sloppy,” Hanssen said, shaking his head. “But they should’ve caught him far earlier.”

His shoulder bumped into mine. I braced and pushed back. He did that constantly—drifting into me as we walked, sometimes steering me into walls. I still don’t know if it was his gimpy left leg, a deliberate power move, or just something he found amusing.

Whatever the reason, he never apologized. Not once.

“Did you know Ames passed every polygraph they gave him?” Hanssen said, eyebrows raised. “Fooled the examiners—even showing up drunk, with a house paid for in cash, a Jaguar paid for in cash, fur coats for his wife…”

He scoffed.

“And they wonder why we find all the spies in the CIA.”

“So you don’t think much of Ames?” I asked, unable to resist. “I mean… he was the most damaging spy in U.S. history.”

Hanssen stopped short and turned on me.

His face hardened—so rigid it looked carved from stone.

“Aldrich Ames was a failure in every way,” he said. “He let greed and pride drive his basest instincts. A coward. A failure.”

Then he jabbed a finger into my chest.

“Do you know what he said when the CIA finally called in the FBI and the joint task force investigated him?”

I stepped back slightly, reclaiming space, and met his eyes—my boss, my mentor, and the man I would soon learn was America’s most devastating spy.

“What did he say?”

Hanssen lifted his hands and flapped them theatrically, mimicking panic.

“You’re making a big mistake!” he whined, voice rising into a mock, theatrical pitch. “You must have the wrong man!”

He dropped his hands and sneered.

“Coward to the last.”

Then the mask slid back into place. The familiar cold gaze. The exhaustion underneath.

“Let’s go,” he said. “We’re going to be late.”

I remembered that conversation the moment I heard Hanssen had been arrested—and what he said when FBI agents closed in on him near his home on Talisman Lane.

Given what he thought of Ames, I’ve always wondered whether Hanssen rehearsed his own arrest—whether he planned his words the way other men plan their last prayer.

I don’t have to wonder.

After all the time I spent with him, I knew his narcissism wouldn’t allow anything less than a carefully staged exit.

“The guns are not necessary,” he said calmly as agents surrounded him from all angles, weapons drawn.

And then, with that slight, familiar smirk—the one I’d seen in countless conversations.

“What took you so long.”

“What took you so long?”

Cybersecurity Tip of the Week

Your Phone Is a Goldmine (For You… and Attackers)

Most people treat their smartphone like a private vault.

Attackers treat it like a shopping mall with the doors unlocked.

The biggest cybersecurity risk on your phone is a basic account takeover exploiting weak passwords, reused passwords, no two-factor authentication, and cloud backups that quietly sync your life into a single point of failure.

Back in 2014, a brute-force style attack helped expose nude photos of dozens of celebrities, and people reportedly sold “sneak peeks” online for Bitcoin. It was sensational and ugly—but it was also a stark warning.

Fast forward to now: this same playbook has evolved into a booming criminal business model: extortion. Hackers break into poorly protected phones, emails, and cloud accounts, then search for anything embarrassing or valuable: intimate photos, private messages, financial documents, even personal secrets. If they find it, they weaponize it.

So here’s the play: lock down your accounts.

  • Use two-factor authentication on your Apple ID, Google account, email, and social media

  • Stop reusing passwords (password managers exist for a reason)

  • Review what your phone automatically backs up to the cloud

  • Assume anything you text, DM, or upload can be copied, forwarded, stolen, leaked, or “accidentally” shared

  • Beware sending any sensitive information over text, email or social media DMs

And the simplest rule of all: NEVER use a smartphone—or any connected device—to take images you wouldn’t want made public. Don’t text them either. You lose control instantly. If you must take them, stick to polaroids.

Are you PROTECTED?

My new hub, PROTECT, is now live at ericoneill.net/protect and it’s built for anyone who wants to stop cybercriminal scammers cold. And it’s FREE!

If you want the full battle manual, that’s in Spies, Lies and Cybercrime. If you want to start protecting yourself right now? Begin here

Praemonitus Praemunitus!

Technology News of the Week

TikTok Deal Update (And Why I’m Not Celebrating Yet)

TikTok is inching toward a deal that would place its U.S. operations under American ownership—or at least American supervision. The newest developments focus on the easiest national security fix: where U.S. user data is stored. TikTok claims American user data will remain in the U.S., housed in Oracle Cloud, under a privacy and cybersecurity program audited by third-party experts.

That’s the good news.

But here’s my concern: data storage was never the hardest part of the TikTok problem. The real issue has always been the algorithm.

TikTok’s recommendation engine is the reason the app is so addictive, so effective, and so powerful. Critics (including me) argue it pushes harmful content, especially to teenagers and kids. And from a national security standpoint, the fear isn’t just “China might see your data.” The fear is China could influence what Americans see—shaping narratives, suppressing stories, or amplifying propaganda and disinformation.

The 2024 law prohibits ByteDance “cooperation” with the U.S. TikTok entity on operating the algorithm. So the biggest question is simple:

Does the U.S. entity truly own and control the algorithm—or is it still dependent on ByteDance through licensing or coordination?

If ByteDance still has a hand on the steering wheel—even indirectly—then we haven’t removed the national security risk. We’ve just repackaged it.

Get the Book: Spies, Lies, and Cybercrime

If you haven’t already, please buy SPIES, LIES, AND CYBERCRIME. If you already have, thank you, and please consider gifting some to friends and colleagues. It’s the perfect gift for tech enthusiasts, entrepreneurs, elders, teenagers, and everyone in between.

📖 Support my local bookstore. Get a Signed copy

Please Leave a 5-star review on Amazon or on Goodreads.

🎤  I’m on the road doing speaking events. If your company or organization is interested in bringing me to a stage in 2026, book me to speak at your next event.

If you’ve ever paused at an email, login alert, or message and thought, “Could this happen to me?”—my Linkedin Learning course is for you! Login and start learning here.

Appearance of the Week

I joined Forcepoint’s To the Point Podcast to explore the limits of AI in cybersecurity, including why human judgment, verification, and creativity remain critical even as automation accelerates. Through real investigations, clear metaphors, and practical examples, this discussion helps security leaders understand how to prepare for threats that never stop evolving.

Please support my sponsor. It only takes a click. No purchase necessary!

But what can you actually DO about the proclaimed ‘AI bubble’? Billionaires know an alternative…

Sure, if you held your stocks since the dotcom bubble, you would’ve been up—eventually. But three years after the dot-com bust the S&P 500 was still far down from its peak. So, how else can you invest when almost every market is tied to stocks?

Lo and behold, billionaires have an alternative way to diversify: allocate to a physical asset class that outpaced the S&P by 15% from 1995 to 2025, with almost no correlation to equities. It’s part of a massive global market, long leveraged by the ultra-wealthy (Bezos, Gates, Rockefellers etc).

Contemporary and post-war art.

Masterworks lets you invest in multimillion-dollar artworks featuring legends like Banksy, Basquiat, and Picasso—without needing millions. Over 70,000 members have together invested more than $1.2 billion across over 500 artworks. So far, 25 sales have delivered net annualized returns like 14.6%, 17.6%, and 17.8%.*

Want access?

Investing involves risk. Past performance not indicative of future returns. Reg A disclosures at masterworks.com/cd

Like What You're Reading?

Don’t miss a newsletter! Subscribe to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.

Continue Reading

Reply

or to participate

Recommended for you