Cybercrime, the more formal term for computer hacking is making the news more than ever. At the corner of much of the recent news is the cyber terrorist group Anonymous. According to one member, if you identify yourself by name, you're no longer a "member" of Anonymous. Anonymous has no leader, no chain of command and no formal membership. It is a syndicate of international people who fight against injustices. (To read more about computer hacks, check out Most Costly Computer Hacks Of All Time.)

TUTORIAL: Investing 101

Anonymous represents a generation of cybercriminals much more evolved than cybercrime's founding fathers. One of its favorite targets is the military. In fact, during this week's attack on what Anonymous calls, "military Monday", the group published the login credentials for 90,000 email accounts from the Marine Corps, Homeland security, SOCOM and other government agencies by breaking in to a large government contractor's servers.

Anonymous said in a release that it expected it to be difficult to break into a company server like Defense contractor Booz Allen Hamilton, but found a server that had very little security and it ended up being very simple. Anonymous has also victimized Bank of America, Visa, Mastercard, the city of Orlando and many other big name clients.

Anonymous doesn't pick its targets at random. Each of its targets has done something which, in the mind of Anonymous, is a social injustice, often citing an attack on a person's freedom of speech. Visa and Mastercard were targeted because of their refusal to process donations received for Wikileaks. This represents a shift from the days when hacking was done for not much more than bragging rights.

New Kind of Terrorist
Anonymous has raised the stakes in cybercrime. What used to be small attacks on relatively small websites has evolved into costing companies large amounts of money.

The recent outage of the Sony Playstation Network will end up costing Sony $24 billion to fully clean up the damage done by hackers. This estimate includes the cost of repairing the network as well as the rush of class action lawsuits centered around the breach of subsequent release of customer data. (If you feel you have been a victim of having your information stolen, read Identity Theft: Who To Call For Help.)

Power Grid
Many fear that the next evolutionary jump for cybercrime is when the damage reaches catastrophic levels. In an experiment dubbed the Aurora experiment, a large power generator was broken in to by a hacker. The hacker was able to make it physically self-destruct to the point where it was unrepairable. When a generator suffers catastrophic damage, they have to be ordered and manufactured which takes months at the least and years at the most.

Although our power grid is criticized as being largely outdated, that has helped to shield it from hackers. The easiest way to keep something safe from cyber attack is to not plug it into the internet, but as the grid is slowly updated and placed online, it is becoming more and more vulnerable to cyber attack. If a coordinated attack were to take place on the power grid and generators damaged beyond repair, the economic effects are unthinkable. Large areas of the country could be in the dark for a very long time costing billions of dollars.

Fortunately, the world's governments have worked extensively on this and have made progress. "We've worked really closely with (other countries) and the power grids are very redundant across the United States, to include Canada, such that the ability to do that nationally or even regionally is really hard to do based upon the work that we've done in the industry," said Ron Dick, who works on this issue for the FBI.

Waste Management
In 2000, a person who was upset that he wasn't hired for a job with the city, hacked in to its waste management system and caused 2 million gallons of raw sewage to be released into parks, streams and local hotels in Australia. Not only was this considered a nuisance and the cost to the city to clean up was sizable, the public health threat could have been much worse. Although a large amount of animals died, no humans suffered serious health concerns in the attack. This event proved that a coordinated attack against all areas of infrastructure is possible.

Health Care
With a push towards healthcare records being completely automated, this presents an opportunity for attackers to steal names, addresses, health insurance information and social security numbers of patients. This information is worth big money online for other identity thieves. Second, new technology allows doctors to perform procedures from a remote location by harnessing the power of the internet. Could this be a future source for hackers?

The Cloud
The cloud is the new way of using the internet, and it's growing at an almost uncontrollable rate. An overgeneralization of the cloud is that it eliminates the hard drive from your computer because all of your files and programs can be accessed and used from an outside server. This is often referred to as the cloud.

Dr. Nir Ksherti, an associate professor of business administration in UNCG's Bryan School of Business and Economics says that the security policies haven't kept up with the growing popularity of the cloud and, because of that, they are largely vulnerable to attach. Because the cloud is used by some of the country's largest companies, a large scale threat may be developing.

The Bottom Line
With cybercrime costing larger organizations an average cost of $3.8 million per year with some as high as $52 million, and the threat to countries becoming more real every day, the military now sees the cyber landscape on par with land, sea and air. (With the landscape of the world constantly changed, how would past leaders handle it? For more read If These Famous World Leaders Were In Finance.)

Related Articles
  1. Investing Basics

    4 Iconic Financial Companies That No Longer Exist

    Learn how poor management, frauds, scandals or mergers wiped out some of the most recognizable brands in the finance industry in the United States.
  2. Active Trading

    What Is A Pyramid Scheme?

    The FTC announced it had opened an official investigation of Herbalife, which has been accused of running a pyramid scheme. But what exactly does that mean?
  3. Investing Basics

    How Financial Statements Are Manipulated

    Financial statement manipulation is an ongoing problem, and investors who buy stocks or bonds should be aware of its signs and implications.
  4. Economics

    3 Notorious American White Collar Criminals

    Learn about the crimes and punishments of some of the most infamous convicted white-collar crooks.
  5. Savings

    Is It Safe to Send Money Through Gmail?

    Learn why Google's safeguards minimize the risks of sending money via Gmail, but also realize how hackers' sophistication always renders the Internet less than 100% safe.
  6. Investing Basics

    Top 3 Most Scandalous Insider Trading Debacles

    While insider trading is often difficult to spot, there have been plenty of egregious examples in history that were fairly simple to detect.
  7. Economics

    Detecting Financial Statement Fraud

    Fraudulent financial statements account for about 10% of the white-collar crime incidents reported each year.
  8. Professionals

    10 Must Watch Documentaries For Finance Professionals

    Find out about some of the best documentaries that finance professionals can watch to gain a better understanding of their industry.
  9. Savings

    Is It Safe to Send Money Through Facebook?

    Learn how Facebook employs strong measures to keep your information safe when sending money, but understand the rare threats that still exist.
  10. Investing

    How Shackling Offshore Banks Will Impact You

    FATCA regulations have cast a wide net on offshore banking activities, and many innocent account holders might get caught in its tangle.
  1. What are some high-profile examples of wash trading schemes?

    In 2012, the Royal Bank of Canada (RBC) was accused of a complex wash trading scheme to profit from a Canadian tax provision, ... Read Full Answer >>
  2. What are examples of inherent risk?

    Inherent risk is the risk imposed by complex transactions that require significant estimation in assessing the impact on ... Read Full Answer >>
  3. What is the difference between wash trading and insider trading?

    Wash trading is an illegal trading activity that artificially pumps up trading volume in a stock without the stock ever changing ... Read Full Answer >>
  4. What impact did the Sarbanes-Oxley Act have on corporate governance in the United ...

    After a prolonged period of corporate scandals involving large public companies from 2000 to 2002, the Sarbanes-Oxley Act ... Read Full Answer >>
  5. Who are the most famous people convicted of insider trading?

    In finance, insider trading refers to the buying and selling of security by a person who has access to material non-public ... Read Full Answer >>
  6. What's the difference between insider trading and insider information?

    Insider information is the knowledge of nonpublic material about a publicly traded company that may affect the stock's price. ... Read Full Answer >>

You May Also Like

Hot Definitions
  1. Barefoot Pilgrim

    A slang term for an unsophisticated investor who loses all of his or her wealth by trading equities in the stock market. ...
  2. Quick Ratio

    The quick ratio is an indicator of a company’s short-term liquidity. The quick ratio measures a company’s ability to meet ...
  3. Black Tuesday

    October 29, 1929, when the DJIA fell 12% - one of the largest one-day drops in stock market history. More than 16 million ...
  4. Black Monday

    October 19, 1987, when the Dow Jones Industrial Average (DJIA) lost almost 22% in a single day. That event marked the beginning ...
  5. Monetary Policy

    Monetary policy is the actions of a central bank, currency board or other regulatory committee that determine the size and ...
  6. Indemnity

    Indemnity is compensation for damages or loss. Indemnity in the legal sense may also refer to an exemption from liability ...
Trading Center