Many people treat cyber threats and digital fraud as a new phenomenon that only appeared with the development of the internet. But fraud – intentional deceit to manipulate a victim – has always existed; it is just the tools that have changed.
In a recent online course for the Open Institute of Technology (OPIT), AI & Cybersecurity Strategist Tom Vazdar, chair of OPIT’s Master’s Degree in Enterprise Cybersecurity, demonstrated the striking parallels between some of the famous fraud cases of the 18th century and modern cyber fraud.
Why does the history of fraud matter?
Primarily because the psychology and fraud tactics have remained consistent over the centuries. While cybersecurity is a tool that can combat modern digital fraud threats, no defense strategy will be successful without addressing the underlying psychology and tactics.
These historical fraud cases Vazdar addresses offer valuable lessons for current and future cybersecurity approaches.
The South Sea Bubble (1720)
The South Sea Bubble was one of the first stock market crashes in history. While it may not have had the same far-reaching consequences as the Black Thursday crash of 1929 or the 2008 crash, it shows how fraud can lead to stock market bubbles and advantages for insider traders.
The South Sea Company was a British company that emerged to monopolize trade with the Spanish colonies in South America. The company promised investors significant returns but provided no evidence of its activities. This saw the stock prices grow from £100 to £1,000 in a matter of months, then crash when the company’s weakness was revealed.
Many people lost a significant amount of money, including Sir Isaac Newton, prompting the statement, “I can calculate the movement of the stars, but not the madness of men.“
Investors often have no way to verify a company’s claim, making stock markets a fertile ground for manipulation and fraud since their inception. When one party has more information than another, it creates the opportunity for fraud. This can be seen today in Ponzi schemes, tech stock bubbles driven by manipulative media coverage, and initial cryptocurrency offerings.
The Diamond Necklace Affair (1784-1785)
The Diamond Necklace Affair is an infamous incident of fraud linked to the French Revolution. An early example of identity theft, it also demonstrates that the harm caused by such a crime can go far beyond financial.
A French aristocrat named Jeanne de la Mont convinced Cardinal Louis-René-Édouard, Prince de Rohan into thinking that he was buying a valuable diamond necklace on behalf of Queen Marie Antoinette. De la Mont forged letters from the queen and even had someone impersonate her for a meeting, all while convincing the cardinal of the need for secrecy. The cardinal overlooked several questionable issues because he believed he would gain political benefit from the transaction.
When the scheme finally exposed, it damaged Marie Antoinette’s reputation, despite her lack of involvement in the deception. The story reinforced the public perception of her as a frivolous aristocrat living off the labor of the people. This contributed to the overall resentment of the aristocracy that erupted in the French Revolution and likely played a role in Marie Antoinette’s death. Had she not been seen as frivolous, she might have been allowed to live after her husband’s death.
Today, impersonation scams work in similar ways. For example, a fraudster might forge communication from a CEO to convince employees to release funds or take some other action. The risk of this is only increasing with improved technology such as deepfakes.
Spanish Prisoner Scam (Late 1700s)
The Spanish Prisoner Scam will probably sound very familiar to anyone who received a “Nigerian prince” email in the early 2000s.
Victims received letters from a “wealthy Spanish prisoner” who needed their help to access his fortune. If they sent money to facilitate his escape and travel, he would reward them with greater riches when he regained his fortune. This was only one of many similar scams in the 1700s, often involving follow-up requests for additional payments before the scammer disappeared.
While the “Nigerian prince” scam received enough publicity that it became almost unbelievable that people could fall for it, if done well, these can be psychologically sophisticated scams. The stories play on people’s emotions, get them invested in the person, and enamor them with the idea of being someone helpful and important. A compelling narrative can diminish someone’s critical thinking and cause them to ignore red flags.
Today, these scams are more likely to take the form of inheritance fraud or a lottery scam, where, again, a person has to pay an advance fee to unlock a much bigger reward, playing on the common desire for easy money.
Evolution of Fraud
These examples make it clear that fraud is nothing new and that effective tactics have thrived over the centuries. Technology simply opens up new opportunities for fraud.
While 18th-century scammers had to rely on face-to-face contact and fraudulent letters, in the 19th century they could leverage the telegraph for “urgent” communication and newspaper ads to reach broader audiences. In the 20th century, there were telephones and television ads. Today, there are email, social media, and deepfakes, with new technologies emerging daily.
Rather than quack doctors offering miracle cures, we see online health scams selling diet pills and antiaging products. Rather than impersonating real people, we see fake social media accounts and catfishing. Fraudulent sites convince people to enter their bank details rather than asking them to send money. The anonymity of the digital world protects perpetrators.
But despite the technology changing, the underlying psychology that makes scams successful remains the same:
- Greed and the desire for easy money
- Fear of missing out and the belief that a response is urgent
- Social pressure to “keep up with the Joneses” and the “Bandwagon Effect”
- Trust in authority without verification
Therefore, the best protection against scams remains the same: critical thinking and skepticism, not technology.
Responding to Fraud
In conclusion, Vazdar shared a series of steps that people should take to protect themselves against fraud:
- Think before you click.
- Beware of secrecy and urgency.
- Verify identities.
- If it seems too good to be true, be skeptical.
- Use available security tools.
Those security tools have changed over time and will continue to change, but the underlying steps for identifying and preventing fraud remain the same.
For more insights from Vazdar and other experts in the field, consider enrolling in highly specialized and comprehensive programs like OPIT’s Enterprise Security Master’s program.
Check out OPIT degrees
-
Career aligned
-
Fully Online
-
EU-accredited institution