36: The Identity Revolution

Spies, Lies & Cybercrime by Eric O'Neill

In This Issue

Title Story: The Identity Revolution: How Future Tech Will Bury Cybercrime: Our so-called identity systems—SSNs, driver’s licenses, passwords—are brittle relics of a bygone era. They’re easy for hackers to steal and even easier to exploit.

Cybersecurity Tip of the Week: Security researchers just uncovered thousands of hacked websites delivering stealthy malware to Mac users. Here’s how to protect yourself.

Cybersecurity Breach of the Week: Researchers just revealed that Nissan’s Leaf, the humble electric hatchback, can be remotely hacked and steered… with just a browser.

Tech of the Week: Meet Posha—your new countertop chef. It doesn’t just follow recipes. It decides how you want to eat, adjusts for taste, and cooks with the robotic precision of a Michelin-starred sous-chef who never complains.

AI Image of the Week: I use AI to recreate Robert Hanssen’s office (from an actual photo) moments before I infiltrated and stole his Palm Pilot.

Title Story - The Identity Revolution

It’s the year 2035. You’ve just landed in Geneva for an international summit. No passport. No ID badge. As you approach the airport exit, a light hum signals your presence. A sensor reads your DNA—collected subtly from your skin oils on the armrest mid-flight—and instantly verifies who you are. Customs is a thing of the past. Your hotel room unlocks as you step into the lobby. The espresso machine in your suite starts brewing your preferred roast. Your entire digital life, protected at the molecular level, is now a seamless extension of you.

Welcome to the future of identity.

But to understand how we get there, we need to look at where we are now—and it’s not pretty.

The Problem with Today

Your social security number was never meant to be your secret weapon. It was supposed to be a government identifier, not the golden key to your entire life. Add to that your mother’s maiden name, your first pet, and a password you probably reused five times—and you’ve basically handed over your identity to cybercriminals with a neon “STEAL ME” sign flashing above your head.

Today, over 19 billion passwords are floating around on the dark web like discarded candy wrappers. Infostealer malware incidents have exploded by 500% in just one year. Our so-called identity systems—SSNs, driver’s licenses, passwords—are brittle relics of a bygone era. They’re easy for hackers to steal and even easier to exploit.

This has become a trust crisis, and our identity needs a revolution.

Meet the Future: Four Identity Breakthroughs That Feel Like Sci-Fi

Let’s fast-forward. Not into fantasy, but into very real, rapidly advancing technologies that will make today’s ID theft seem like someone trying to pick your lock with a banana.

1. DNA-Based Digital Identity: Who You Are, Literally

Your DNA is the most personal identifier you have—unchangeable, unforgeable, and one-of-a-kind. Now imagine combining that with blockchain. That’s the premise behind emerging DNA-based digital identity systems.

Here’s how the story might play out:

A foreign cyberespionage unit has stolen sensitive information about a high-ranking government official to access critical U.S. infrastructure. They have her devices, her phone, even her retina scans. But without her DNA, they’re locked out. Every digital door—from the Pentagon’s secure comms to her personal financial apps—is sealed. Because each requires not just something she knows or something she has, but something she is.

Every system on the official’s devices is locked behind a real-time molecular signature. Before granting access, the OS runs an invisible check against microscopic traces—skin oils, hair follicles, or even residual sweat. No match, no entry. The hardware might be in enemy hands, but the keys are still in her cells.

DNA-based ID is already being tested in high-security environments, and while ethical concerns and data storage methods are still being debated, the potential to eliminate identity fraud at the biological level is closer than you think.

2. IoT-Based Ambient Authentication: Security That Follows You Like a Shadow

Passwords are annoying. Typing them. Remembering them. Resetting them. What if you never had to log in to anything again—because the world just knows it’s you?

This is the idea behind ambient authentication. Your smartwatch, your smart shoes, even your smart coffee mug—devices embedded with identity signals that sync together to create a seamless profile of you. If they all agree it’s you walking into the room, your devices unlock. Your emails appear. Your access is granted.

Here’s an example:

You’re an emergency response coordinator arriving at a disaster site. No time to log in. As you step onto the mobile command unit, your wearable devices confirm your identity and unlock mission-critical communications before you even touch a keyboard. Hackers? Left standing at the gate.

This revolution transcends convenience—it’s about making identity passive, secure, and fluid.

3. Quantum-Enhanced Biometrics: The Uncrackable Key

Quantum computing may be the death knell for today’s encryption, but it’s also giving birth to the next generation of identity protection: quantum-enhanced biometrics.

Think of this as encryption that doesn’t just scramble data—it puts it in a quantum state, meaning even observing it incorrectly can destroy the information. Your fingerprint scan, facial recognition, or iris scan is paired with quantum-generated keys that can’t be intercepted or duplicated.

Now imagine this:

A whistleblower in a hostile country accesses encrypted files exposing corruption. Quantum-enhanced biometrics secure his access. The moment an unauthorized attempt is made to replicate his credentials—even by a supercomputer—the system collapses the encryption and the whistleblower’s account disappears.

This tech is under development now, and it’s looking like the unhackable future we desperately need.

4. Brainwave Authentication: Mind Over Malware

You’re not truly you until your brain says so.

Brainwave authentication uses EEG sensors to detect your brain’s unique electrical patterns in response to specific stimuli. Unlike a password, which you can forget or someone can steal, your brain’s reaction to a question, image, or sound is as unique as your fingerprint—only a lot harder to mimic. 

Let’s go full Black Mirror:

A CEO wears a discreet EEG device that allows her to sign high-value contracts with her thoughts. When she authorizes a transaction, the system verifies not just her identity but also her emotional state—reducing the risk of coercion or duress. No brainwave match? No deal.

This isn’t fantasy. Research labs and startups are already experimenting with brain-computer interfaces for authentication. It’s weird. It’s wild. And it could become your next login method.

The Takeaway: Identity Should Be You

We can’t afford to keep patching holes in a sinking ship. The old model of identity—SSNs, passwords, knowledge-based questions—is fundamentally broken. Cybercriminals are outpacing our defenses because we’re still trying to fight tomorrow’s wars with yesterday’s weapons.

Future identity must be:

  • Personal: tied to who you are, not what you know.

  • Invisible: always on, never annoying.

  • Immutable: impossible to steal or replicate.

  • Intelligent: adapting to your context and behavior.

DNA, IoT-based authentication, quantum biometrics, and brainwave IDs are more than tech trends. They’re the frontlines of a new war for digital trust.

Stay safe, stay smart, and for heaven’s sake, stop reusing your dog’s name as a password!

Cybersecurity Tip of the Week

Yes, Your Mac Can Get Hacked

Still believe Macs don’t get viruses? Time to retire that myth.

Security researchers just uncovered thousands of hacked websites delivering stealthy malware to Mac users. The scheme exploits fake software updates—particularly for Safari or Chrome. You visit a compromised site, get prompted to “update your browser,” and boom—you’ve just installed spyware.

The malware can record your keystrokes, steal credentials, and give remote access to your machine. These attacks are tailored for macOS and built to blend in. They bypass traditional antivirus tools and rely on you to click.

How to stay safe:

  1. Never install software from pop-ups. Real browser updates come through the app itself—not a sketchy website.

  2. Use a dedicated malware scanner for Mac, like Malwarebytes or AVG Internet Security. Yes, even on a Mac.

  3. Enable Gatekeeper and XProtect. MacOS includes built-in defenses—don’t disable them.

  4. Keep macOS and all your apps updated. But only from the App Store or official sources.

  5. Consider locking down browser settings. Disable pop-ups, block third-party cookies, and run privacy extensions like uBlock Origin or DuckDuckGo.

Macs are solid—but no device is invincible. The safest users aren’t the ones with the best computers. They’re the ones who never click “update” on a random website.

Cybersecurity Breach of the Week

Nissan Leaf Hijacked by Code

In a scene ripped straight out of a Bond film—or a Black Hat demo—researchers just revealed that Nissan’s Leaf, the humble electric hatchback, can be remotely hacked and steered… with just a browser.

Security researcher Till Kottmann discovered a gaping hole in Nissan’s global app-to-car communications system. The exploit targets the car’s Telematics Control Unit (TCU), allowing a remote attacker to control lights, wipers, turn signals, and—most alarmingly—steering. The system wasn’t properly authenticating the source of commands. So, with the right URL and some knowledge of how the Leaf’s systems work, your car could become someone else’s toy.

Nissan says the vulnerability doesn’t impact vehicles in the U.S. and claims no customer data was leaked. Still, the breach raises questions about over-the-air command security, vehicle firmware, and just how much control you’re handing over when your car connects to the cloud.

What can you do?

If you drive a connected car, check for software updates yourself. Disable remote app controls if you’re not using them. And push your dealer or manufacturer for transparency about what data your car is sending—and who’s allowed to talk back.

Tech of the Week

A Robot That Cooks (and Judges) Your Meals

Meet Posha—your new countertop chef. It doesn’t just follow recipes. It decides how you want to eat, adjusts for taste, and cooks with the robotic precision of a Michelin-starred sous-chef who never complains.

Posha is a sleek robotic appliance designed to handle prep and cooking for you. It’s packed with sensors, robotic arms, and AI that learns your flavor preferences over time. Craving spicy? Keto? Low-sodium? It adapts. You can load ingredients into its fridge-like compartments, schedule a meal, and come back to dinner made. No stirring, flipping, or overcooked eggs.

It’s basically the Roomba of your kitchen—if Roomba could sear a steak and tell you it’s medium-rare.

The company behind it claims Posha uses machine learning and thermal sensors to not only cook your meals but perfect them. It’s still early days—limited availability, high cost—but it points to a future where cooking might become as nostalgic as dialing a rotary phone.

AI Image of the Week

This is an image I recreated with AI from a photo I snapped of Robert Hanssen’s office right after his arrest. I placed the blue briefcase in the image to show what it looked like (in my memory) the day I snuck in and took the palm pilot from his bag.

Like What You're Reading?

Don’t miss a newsletter! Subscribe to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.

Are you protected?

Recently nearly 3 billion records containing all our sensitive data was exposed on the dark web for criminals, fraudsters and scammers to data mine for identity fraud. Was your social security number and birthdate exposed? Identity threat monitoring is now a must to protect yourself? Use this affiliate link to get up to 60% off of Aura’s Cybersecurity, Identity monitoring and threat detecting software!

Want to start a newsletter?

Use this Link to get a 30 days trial + 2-% Beehiiv!

Ready for Next Week?

What do YOU want to learn about in my next newsletter? Reply to this email or comment on the web version, and I’ll include your question in next month’s issue!

Thank you for subscribing to Spies, Lies and Cybercrime. Please comment and share the newsletter. I look forward to helping you stay safe in the digital world.

Best,
Eric

Let's make sure my emails land straight in your inbox.

Gmail users: Move this email to your primary inbox

On your phone? Hit the 3 dots at top right corner, click "Move to" then "Primary."

On desktop? Close this email then drag and drop this email into the "Primary" tab near the top left of your screen

Apple mail users: Tap on our email address at the top of this email (next to "From:" on mobile) and click “Add to VIPs”

For everyone else: follow these instructions

Partner Disclosure: Please note that some of the links in this post are affiliate links, which means if you click on them and make a purchase, I may receive a small commission at no extra cost to you. This helps support my work and allows me to continue to provide valuable content. I only recommend products that I use and love. Thank you for your support!

Reply

or to participate.