{"id":210819,"date":"2017-02-24T02:25:40","date_gmt":"2017-02-24T07:25:40","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/frank-abagnale-world-famous-con-man-explains-why-technology-wont-stop-breaches-ars-technica.php"},"modified":"2017-02-24T02:25:40","modified_gmt":"2017-02-24T07:25:40","slug":"frank-abagnale-world-famous-con-man-explains-why-technology-wont-stop-breaches-ars-technica","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/technology\/frank-abagnale-world-famous-con-man-explains-why-technology-wont-stop-breaches-ars-technica.php","title":{"rendered":"Frank Abagnale, world-famous con man, explains why technology won&#8217;t stop breaches &#8211; Ars Technica"},"content":{"rendered":"<p><p>Enlarge \/ Frank Abagnale,    as played by Leonardo DiCaprio in Catch Me If You Can,    once pretended to be a doctor. Now he's teaching the health    industry about the threat of identity theft.    <\/p>\n<p>    Dreamworks  <\/p>\n<p>    Frank Abagnale is world-famous for pretending to be other    people. The former teenage con man, whose exploits 50 years ago    became a Leonardo DiCaprio film called Catch Me If You    Can, has built a lifelong career as a security consultant    and advisor to the FBI and other law enforcement agencies. So    it's perhaps ironic that four and a half years ago, his    identity was stolenalong with those of 3.6 million other South    Carolina taxpayers.  <\/p>\n<p>    \"When that occurred,\" Abagnale recounted to Ars, \"I was at the    FBI office in Phoenix. I got a call from [a reporter at] the    local TV news station, who knew that my identity was stolen,    and they wanted a comment. And I said, 'Before I make a    comment, what did the State Tax Revenue Office say?' Well, they    said they did nothing wrong. I said that would be absolutely    literally impossible. All breaches happen because people make    them happen, not because hackers do it. Every breach occurs    because someone in that company did something they weren't    supposed to do, or somebody in that company failed to do    something they were supposed to do.\" As it turned out (as a    Secret Service investigation determined), a government employee    had taken home a laptop that shouldn't have left the office and    connected itunprotectedto the Internet.  <\/p>\n<p>    Government breaches of personal information have become all too    common, as demonstrated by the impact of the hacking of the    Office of Management and Budget's personnel records two years    ago. But another sort of organization is now in the crosshairs    of criminals seeking identity data to sell to fraudsters:    doctors' offices. Abagnale was in Orlando this week to    speak to health IT professionals at the 2017 HIMSS    Conference about the rising    threat of identity theft through hacking medical recordsa    threat made possible largely because of the sometimes haphazard    adoption of electronic medical records systems by health care    providers.  <\/p>\n<p>    Abagnale warned that the value of a medical record to identity    thieves far surpasses that of just a name, date of birth, and    social security number. That's because it provides an even    bigger window into an individual's life. Abagnale saysthe    responses of organizations (including the state government of    South Carolina and the OPM) to theft of sensitive personal    information is far from adequateand because there's no way to    effectively change the data, it can be held for years by    criminals and still be valuable.  <\/p>\n<p>    Nikki Haley, the governor of South Carolina at the time of the    breach, \"ordered credit monitoring for every citizen in the    state for free for one year,\" Abagnale said. \"I wrote her a    letter the next day that said one year of credit monitoring    services was worthless, because people who steal mass data    warehouse that data for sometimes three to five years. So    they're not going to put it in the marketplace when you told    them you're giving credit monitoring for one year.\" President    Obama ordered free credit protection for those affected by the    OPM breach for 10 yearsthough the original plan ran out in    December, and it's    on the shoulders of those whose information was exposed to    re-up for the protection.  <\/p>\n<p>    When credit card data is stolen, Abagnale explained, criminals    \"have to get rid of it right away\"because credit cards can be    replaced and fraud stopped quickly. \"But if it is someone's    name, Social Security Number, and date of birththey can't    change [those things]. So the longer I keep the data, the more    valuable it becomes when I go to sell it.\" Abagnale noted that    some of the personal identity data stolen from the breach at TJ    Maxx a decade ago is just starting to surface on the black    market, for instance.  <\/p>\n<p>    Abagnale said that there's been a surge in the past few years    in medical identity theft. \"It's as simple as, I'm in Orlando    and I break my leg, I have no insurance, and I go to the    hospital and say I'm you,\" he explained. \"I give them your    information, they treat me, they bill your insurance agency,    and then your insurance company eventually notifies you because    there was a deductible. And you say, 'wait a minute, I was    never in Orlando, I never broke my leg.' But it's not that    simpletrying to get that fixed, and trying to get it off your    medical records, and then having collection agencies hounding    you for that money is just unbelievable.\"  <\/p>\n<p>    Such a scenario isjust the beginning of what's possible    with the theft of medical data today. \"Like every form of    identity theft, if I can become you,\" said Abagnale, \"what I    can do as you is only limited by my imagination.\"  <\/p>\n<p>    That's why Abagnale is particularly concerned about the    security of smaller healthcare organizations, especially    pediatricians' practices. \"These days, we're very concerned    about the theft of children'sidentities,\" he explained.    \"We see a huge uptick in people stealing the identities of    children. The younger that child, the more valuable that    identity isbecause if I can become that child, I can become    that child for a long period of time before that child is going    to begetting a credit report or applying for credit or a    job. And a two-year-old's [stolen identity] is not going to    look like a five-year-old a few years later, because someone    can use that identity over and over.\"  <\/p>\n<p>    The wave of ransomware attacks against hospitals last year    served as a stark wake-up call to health providers that they    had a security problem, according to Rod Piechowski, a senior    director at HIMSS. \"Ransomware got the most publicity,\" he    said. \"It put a sense of threats in people'sminds more    than any conversation they'd had previously.\"  <\/p>\n<p>    For many health organizations, those threats are well outside    their wheelhouse. Healthcare organizations have faced a \"real    lift\" in adopting electronic health systems over the past seven    years, Piechowski explained, particularly for those that never    had an information technology department before. It's    \"thousands of hospitals and hundreds of thousands of providers    having to implement information technology,\" he says.  <\/p>\n<p>    Regulations like those under the Health Insurance Portability    and Accountability Act (HIPAA) have always placed privacy and    security requirements on healthcare providers, but the    Affordable Care Act's incentives were intended \"to get people    using and reporting that they were using these electronic    systems,\" Piechowski explained. However, the focus wasn't on    security practices. \"So now all these companies find themselves    in a situation where theyve become way more of a target. We're    seeing an uptick in the intensity and aggression in targeting    of healthcare specifically. There are attackers out there that    are aware of the lack of real defense mechanisms in placeit's    a new game.\"  <\/p>\n<p>    Piechowski's description of what the healthcare industry now    faces is similar to what many companies have been facing for    much of the last decade\"they're constantly seeing phishing    attempts, constantly seeing malware,\" he said. And while there    are technical means to screen against many of the more    brute-force attacks, the value of data in hospitals has led to    much more long-game attacks based on thorough reconnaissance    and probing for weak points. \"There's a longer road, where    first they find out who you are, they learn more about you, and    about the hierarchy of your organization,\" he told Ars. \"We're    seeing more sophisticated approaches to learning about your    organization.\"  <\/p>\n<p>    In other words, hospitals are ripe targets for social    engineeringsomething Frank Abagnale remainsan expert in.    \"It's what I did 50 years ago as a teenager. I didn't have the    access to computers, so I had to use the telephone. Social    engineering is just as powerful today as it was 50 years ago    when I used it.\" Abagnale believes that technology alone will    never defeat a good social engineering game\"the only answer is    to absolutely educate your employees about how to protect    themselves and how to protect their company.\"  <\/p>\n<p>    To that end for the past eight years, Abagnalehas done    \"cyber awareness\" training at major companies across the US to    demonstrate just how vulnerable employees are to the most basic    of social engineering tricks. \"I don't park in the visitor    parking lotI park in the employee parking lot, and then I    remove from my pocket 25 or 30 memory sticks that say on them    'confidential' [and drop them in the parking lot]. Then at    lunchtime, I'll open my laptop to see how many employees    actually went to see what that memory stick had on it, and I    can tell whether they put it in their computer and didn't open    it or if they opened it. In the 7 or 8 years that I've been    doing cyber awareness month, I've yet to be to a companyand    they're all household nameswhere someone hasn't gone to see    what the file on the stick says. And of course what it says is,    'this is a test and you've failed.'\"  <\/p>\n<p>    Abagnale's seminars hammer home the damage that employees can    expose companies to by simply plugging in a USB drive they    found in the parking lot. \"I explain to them that I could have    cost their company a billion dollars overnight. I could have    destroyed the hundred-year-old brand of their company just by    the act of their taking a look at that,\" he says. \"That's the    way you have to bring home that point, and you have to keep    bringing it home. They will get it, but they need to understand    how these things occur. You can't just say to them, 'Hey,    people will hack in; you need to be careful.' You have to    explain to them how they do it, why they do it, what they're    trying to obtain. And once they understand it, they're smart    enough to protect themselves from being a victim against that    risk.\"  <\/p>\n<p>    Abagnale and Piechowski believe the best defense against    breaches is using this sort of reinforcement of the threat    posed by not following policies and procedures. \"What we're    alluding to here,\" explained Piechowski, \"is that it's not just    technologythere's people involved, there's process involved,    and if you don't have a process in place that people    understand, then technology alone is not going to keep you    safe.\" The only effective way to get people to understand and    change to follow policies, he noted, is to spell out whats at    risk.  <\/p>\n<p>    \"The culture of the organization will change in time once it    recognizes the business threat,\" Piechowski said. \"Because if    the business isn't viable, that's their livelihood.\"  <\/p>\n<p>    So the next time you're frustrated by the arcane processes of    your health provider, rememberthey're in placefor    everyone'sprotection.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original post:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/arstechnica.com\/security\/2017\/02\/phish-me-if-you-can-frank-abagnale-says-tech-will-never-defeat-social-engineering\/\" title=\"Frank Abagnale, world-famous con man, explains why technology won't stop breaches - Ars Technica\">Frank Abagnale, world-famous con man, explains why technology won't stop breaches - Ars Technica<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Enlarge \/ Frank Abagnale, as played by Leonardo DiCaprio in Catch Me If You Can, once pretended to be a doctor. Now he's teaching the health industry about the threat of identity theft. Dreamworks Frank Abagnale is world-famous for pretending to be other people.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/technology\/frank-abagnale-world-famous-con-man-explains-why-technology-wont-stop-breaches-ars-technica.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[431576],"tags":[],"class_list":["post-210819","post","type-post","status-publish","format-standard","hentry","category-technology"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/210819"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=210819"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/210819\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=210819"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=210819"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=210819"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}