Cybersecurity

It takes one to know one

Wikimedia image: Frank Abagnale.

Frank Abagnale said that in today's Internet-connected world, fraud has become "4,000 times easier."

Despite the increasingly daunting array of cybersecurity technologies being deployed by federal agencies and industry, it takes only a single mistake by an employee or a lone technical deficiency to expose a weakness, according to one of the world's most notorious confidence men.

Frank Abagnale, the one-time con man who successfully impersonated an airline pilot, a legal assistant in the Louisiana attorney general's office and a doctor in the 1960s, said every computer hack, especially the huge ones that cause the most damage, begins with human error.

Abagnale inspired Steven Spielberg's movie "Catch Me If You Can," in which Leonardo DiCaprio portrayed Abagnale's exploits in identity theft and fraud at Pan American World Airways and other places. According to Pan Am's estimates, between the ages of 16 and 18, he flew more than 1 million miles and took more than 250 flights by deadheading as a Pan Am pilot. He said, however, that he never flew on Pan Am planes and relied instead on the courtesy arrangements that allowed personnel to fly for free on competing airlines.

After serving time in French, Swedish and U.S. prisons on fraud charges, Abagnale has done pro bono security consulting for the Internal Revenue Service, the Secret Service and the Federal Deposit Insurance Corp. He has also consulted for free for the FBI for the past 38 years, ever since getting out of federal prison, as part of personal penance for his past crimes. He makes his living through speaking engagements and his company Abagnale and Associates, which advises corporations on fraud issues.

In his work as a security consultant, he has found breaches of federal networks to be more problematic than those in the commercial arena because the federal government works so slowly and is increasingly hampered by budget and political concerns.

Speaking at a Raytheon cybersecurity technology event on Dec. 2, Abagnale said every big breach he's seen up close began with "someone doing something they shouldn't have."

For instance, a breach of South Carolina's tax agency in 2012 that resulted in the release of detailed tax information for hundreds of thousands of residents began with an employee taking an agency computer home and using it to access the Internet.

During his capers in the late 1960s, Abagnale wrote an untold number of bad checks and manufactured his own identity documents. In today's Internet-connected world, he said fraud has become "4,000 times easier." Where he once needed a $1 million, German-made printing press to create an authentic check, now corporate logos and even corporate officers' signatures are available online, ready to be printed electronically and incorporated into any number of official documents.

Identity badges that he falsified using airplane model decals could now be easily replicated from online sources to fold into any number of fake print or electronic documents.

Identity theft, hacks and electronic fraud steal billions from federal systems every year, but they continue because of government inaction, he said. Medicare lost $100 billion to fraud in 2013, and the IRS paid out more than $7 million in refunds to a Virginia woman who filed fake electronic returns.

With the sheer volume of fraud perpetrated against federal assets, investment in cybersecurity technology could pay for itself in a short time, he said. "If we could cut fraud only 25 percent, we'd save billions. But it goes on and on."

He said fraud boils down to personal ethics and awareness. It takes only one person inside an organization with ulterior motives or without a solid understanding of fraudsters' and hackers' "social engineering" techniques to cripple an organization.

In his current work as a consultant, Abagnale said he runs scenarios in his head about how he might be able to get something past airport security checkpoints. Although there might be 10 Transportation Security Administration agents at a given checkpoint, "all I need to get to is one. It's the same with cybersecurity software and hardware."

About the Author

Mark Rockwell is a senior staff writer at FCW, whose beat focuses on acquisition, the Department of Homeland Security and the Department of Energy.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, tele.com magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at mrockwell@fcw.com or follow him on Twitter at @MRockwell4.


Featured

  • IT Modernization
    Eisenhower Executive Office Building (Image: Wikimedia Commons)

    OMB's user guide to the MGT Act

    The Office of Management and Budget is working on a rules-of-the-road document to cover how agencies can seek and use funds under the MGT Act.

  • global network (Pushish Images/Shutterstock.com)

    As others see us -- a few surprises

    A recent dinner with civil servants from Asia delivered some interesting insights, Steve Kelman writes.

  • FCW Perspectives
    cloud (Singkham/Shutterstock.com)

    A smarter approach to cloud

    Advances in cloud technology are shifting the focus toward choosing the right tool for the job and crafting solutions that truly modernize systems.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.