Cybercrime, the more formal term for computer hacking is making the news more than ever. At the corner of much of the recent news is the cyber terrorist group Anonymous. According to one member, if you identify yourself by name, you're no longer a "member" of Anonymous. Anonymous has no leader, no chain of command and no formal membership. It is a syndicate of international people who fight against injustices. (To read more about computer hacks, check out Most Costly Computer Hacks Of All Time.)

TUTORIAL: Investing 101

Anonymous represents a generation of cybercriminals much more evolved than cybercrime's founding fathers. One of its favorite targets is the military. In fact, during this week's attack on what Anonymous calls, "military Monday", the group published the login credentials for 90,000 email accounts from the Marine Corps, Homeland security, SOCOM and other government agencies by breaking in to a large government contractor's servers.

Anonymous said in a release that it expected it to be difficult to break into a company server like Defense contractor Booz Allen Hamilton, but found a server that had very little security and it ended up being very simple. Anonymous has also victimized Bank of America, Visa, Mastercard, the city of Orlando and many other big name clients.

Anonymous doesn't pick its targets at random. Each of its targets has done something which, in the mind of Anonymous, is a social injustice, often citing an attack on a person's freedom of speech. Visa and Mastercard were targeted because of their refusal to process donations received for Wikileaks. This represents a shift from the days when hacking was done for not much more than bragging rights.

New Kind of Terrorist
Anonymous has raised the stakes in cybercrime. What used to be small attacks on relatively small websites has evolved into costing companies large amounts of money.

The recent outage of the Sony Playstation Network will end up costing Sony $24 billion to fully clean up the damage done by hackers. This estimate includes the cost of repairing the network as well as the rush of class action lawsuits centered around the breach of subsequent release of customer data. (If you feel you have been a victim of having your information stolen, read Identity Theft: Who To Call For Help.)

Power Grid
Many fear that the next evolutionary jump for cybercrime is when the damage reaches catastrophic levels. In an experiment dubbed the Aurora experiment, a large power generator was broken in to by a hacker. The hacker was able to make it physically self-destruct to the point where it was unrepairable. When a generator suffers catastrophic damage, they have to be ordered and manufactured which takes months at the least and years at the most.

Although our power grid is criticized as being largely outdated, that has helped to shield it from hackers. The easiest way to keep something safe from cyber attack is to not plug it into the internet, but as the grid is slowly updated and placed online, it is becoming more and more vulnerable to cyber attack. If a coordinated attack were to take place on the power grid and generators damaged beyond repair, the economic effects are unthinkable. Large areas of the country could be in the dark for a very long time costing billions of dollars.

Fortunately, the world's governments have worked extensively on this and have made progress. "We've worked really closely with (other countries) and the power grids are very redundant across the United States, to include Canada, such that the ability to do that nationally or even regionally is really hard to do based upon the work that we've done in the industry," said Ron Dick, who works on this issue for the FBI.

Waste Management
In 2000, a person who was upset that he wasn't hired for a job with the city, hacked in to its waste management system and caused 2 million gallons of raw sewage to be released into parks, streams and local hotels in Australia. Not only was this considered a nuisance and the cost to the city to clean up was sizable, the public health threat could have been much worse. Although a large amount of animals died, no humans suffered serious health concerns in the attack. This event proved that a coordinated attack against all areas of infrastructure is possible.

Health Care
With a push towards healthcare records being completely automated, this presents an opportunity for attackers to steal names, addresses, health insurance information and social security numbers of patients. This information is worth big money online for other identity thieves. Second, new technology allows doctors to perform procedures from a remote location by harnessing the power of the internet. Could this be a future source for hackers?

The Cloud
The cloud is the new way of using the internet, and it's growing at an almost uncontrollable rate. An overgeneralization of the cloud is that it eliminates the hard drive from your computer because all of your files and programs can be accessed and used from an outside server. This is often referred to as the cloud.

Dr. Nir Ksherti, an associate professor of business administration in UNCG's Bryan School of Business and Economics says that the security policies haven't kept up with the growing popularity of the cloud and, because of that, they are largely vulnerable to attach. Because the cloud is used by some of the country's largest companies, a large scale threat may be developing.

The Bottom Line
With cybercrime costing larger organizations an average cost of $3.8 million per year with some as high as $52 million, and the threat to countries becoming more real every day, the military now sees the cyber landscape on par with land, sea and air. (With the landscape of the world constantly changed, how would past leaders handle it? For more read If These Famous World Leaders Were In Finance.)

Related Articles
  1. Investing Basics

    Toshiba's Accounting Scandal: How It Happened

    Learn how Toshiba's corporate culture and lax internal controls led to an accounting scandal that ended with the resignation of the company's CEO.
  2. Professionals

    Is Your Financial Advisor Looking Out for You?

    Financial advisors sometimes aren't looking out for clients' best interests. Regulators are scrutinizing their practices; investors should too.
  3. Professionals

    Are You Sure You Aren't Ponzi Scheme-Susceptible?

    Anyone can be a victim of a Ponzi scheme — even the most financially literate. Here's how to avoid the next Madoff.
  4. Professionals

    7 Cybersecurity Tips for Advisors

    The digital age has created a new breed of thief who can break into client files at any time, but there are ways to minimize risk exposure.
  5. Professionals

    Tips for Protecting Clients from Scammers

    Predators now have more access to vulnerable clients than ever before; advisors should communicate with clients to better spot potential scams.
  6. Investing News

    Why FIFA Can't Give the 2022 World Cup to Qatar

    Learn about the high price tag for the 2022 World Cup in Qatar, along with allegations of human rights abuses and bribery scandals in the bidding process.
  7. Investing Basics

    Explaining Insider Trading

    While often associated with illegal activity, insider trading actually encompasses both illegal and legal trading of securities.
  8. Economics

    Understanding Money Laundering

    The process of creating the appearance that large amounts of money obtained from serious crimes actually originated from a legitimate source.
  9. Investing

    What's an Agency Problem?

    An agency problem occurs when a conflict of interest arises for an agent -- a person acting on behalf of another person. The conflict of interest arises when the agent’s own interests are different ...
  10. Investing Basics

    The Dodd-Frank Wall Street Reform Act

    The Dodd-Frank Wall Street Reform and Consumer Protection Act, commonly called Dodd-Frank, was passed in 2010. The goal of the act is to prevent another great recession like that of 2008, which ...
RELATED TERMS
  1. Black Money

    Money earned through any illegal activity controlled by country ...
  2. Financial Action Task Force (FATF)

    An intergovernmental organization that designs and promotes policies ...
  3. Banker Trojan

    A malicious computer program designed to gain access to confidential ...
  4. Black Market

    Economic activity that takes place outside government-sanctioned ...
  5. Bear Raid

    The illegal practice of ganging up to push a stock's price lower ...
  6. Cookie Jar Accounting

    A disingenuous accounting practice in which periods of good financial ...
RELATED FAQS
  1. What are some high-profile examples of wash trading schemes?

    In 2012, the Royal Bank of Canada (RBC) was accused of a complex wash trading scheme to profit from a Canadian tax provision, ... Read Full Answer >>
  2. What are examples of inherent risk?

    Inherent risk is the risk imposed by complex transactions that require significant estimation in assessing the impact on ... Read Full Answer >>
  3. What is the difference between wash trading and insider trading?

    Wash trading is an illegal trading activity that artificially pumps up trading volume in a stock without the stock ever changing ... Read Full Answer >>
  4. What impact did the Sarbanes-Oxley Act have on corporate governance in the United ...

    After a prolonged period of corporate scandals involving large public companies from 2000 to 2002, the Sarbanes-Oxley Act ... Read Full Answer >>
  5. Who are the most famous people convicted of insider trading?

    In finance, insider trading refers to the buying and selling of security by a person who has access to material non-public ... Read Full Answer >>
  6. What's the difference between insider trading and insider information?

    Insider information is the knowledge of nonpublic material about a publicly traded company that may affect the stock's price. ... Read Full Answer >>

You May Also Like

Trading Center
×

You are using adblocking software

Want access to all of Investopedia? Add us to your “whitelist”
so you'll never miss a feature!