The new masters of deception

Prologue – The Man Who Painted Lies

Picture Amsterdam in the 1930s. The streets smell of fresh coffee, a light rain taps on windowpanes, and in a small studio, a man with a mischievous glint in his eye wields a paintbrush. His name is Han van Meegeren.

He had talent in spades — but the critics? They weren’t impressed. They said his work was as original as supermarket wallpaper. So he decided, fine — if they adored “great masters” like Vermeer, then he’d give them Vermeer. Not a copy… a new Vermeer.

Van Meegeren wasn’t some amateur counterfeiter. He was the pastry chef of forgery: sourcing 17th-century canvases, cooking paints in old pots, mixing chemicals to give each piece the scent and texture of a 300-year-old masterpiece. By the time he was done, even the experts swore they smelled history.

Then came the day when Hermann Göring himself bought a “Vermeer” from him. The money flowed, museums bowed, and Van Meegeren smiled. The whole world was playing its part in this tragicomedy — and only he knew the punchline.

Fast Forward – From Galleries to Data Towers

Jump to today. The chandeliers and grand halls are gone. We have dashboards, clouds, and Zoom calls.

Our “paintings” are no longer brushstrokes on canvas — they’re digital signatures, online identities, and security certificates. And the thieves of our time? They don’t sip wine in Amsterdam studios; in our imagination, they wear hoodies, type faster than we can think, and sometimes… they’re not even human. They’re AI with zero need for sleep.

If Van Meegeren was the maestro of art forgery, AI today is the maestro of identity forgery.

The New Canvas – Digital Identity

In the art world, the artist’s identity is the seal of authenticity. In the digital world, our identity is the key to the kingdom.

Identity theft today is like sneaking a fake masterpiece into the king’s private collection — except the king is your organization, and the “collection” is your entire treasury of data, money, and trade secrets.

The tools have changed:

  1. Deepfake videos of a CEO urgently requesting a wire transfer.
  2. Perfectly crafted emails with digital signatures that look 100% legitimate — but aren’t.
  3. Stolen credentials give attackers full, invisible access to internal systems.

And here’s the kicker: just like the art experts of Van Meegeren’s day, we often realize the forgery only when the damage is irreversible.

The Forger’s Playbook – As a Cyberattack

If we translate Van Meegeren’s story into cybersecurity language, it reads like a modern attack plan:

  • Reconnaissance – He studied Vermeer down to the tiniest brushstroke. In cyber terms: mapping the target organization’s structure, habits, and weak points.
  • Target Selection – He didn’t waste time on obscure artists; he aimed for high-value names. Today’s attacker goes for the CFO, CEO, or a mission-critical server.
  • Flawless Execution – His “Vermeer” wasn’t just similar — it was Vermeer in the eyes of experts. Likewise, today’s phishing email or fake login page is indistinguishable from the real thing.
  • Distribution – He placed his paintings into prestigious collections; attackers today plant fake identities deep inside corporate systems.
  • Late Discovery – Museums took years to realize. We might take hours — but the breach is often already complete.

When AI Becomes the Master Painter

Van Meegeren spent years perfecting his craft. AI? It can learn your voice, your face, your writing style — in hours.

It can produce a video of you saying something you never said, or send an email that looks like it came from your personal account.

And the scariest part? It doesn’t need to be brilliant. It just needs to click “generate.”

Dark Humor – and a Lesson

The twist in Van Meegeren’s story is that when the truth came out, he became a kind of folk hero. People applauded him for outwitting the Nazis.

In our world, nobody will cheer if a digital forger succeeds. Because the victim won’t be a dictator in another country — it’ll be you.

Defending Against the New Masters

The modern world is full of potential forgers, but you can make their job much harder:

  • Multi-Factor Authentication (MFA) – Like inspecting the painting, the signature, and the provenance all at once.
  • Identity and Certificate Management (IAM & PKI) – Knowing exactly who “signed” what, and when.
  • Real-Time Anomaly Detection – Using AI against AI.
  • Strict Issuance and Access Controls – No access without multi-layer verification.
  • Employee Awareness Training – Teaching people to spot the “odd brushstroke” in an otherwise perfect email.

Epilogue – Don’t Trust Just What You See

Van Meegeren proved that when people want to believe something, they will. They wanted a new Vermeer, and they got… Van Meegeren.

We want to believe the voice on the phone is our manager, that the email is approved, and that the signature is authentic. But in a world where anyone can be anyone at the click of a button, blind trust isn’t enough.

The only defense is a combination of technology, processes, and the willingness to ask the unglamorous but essential question: “Hold on… is that really you?”

Reach out to our expert team

Skip to content