Keyboard Criminals: How Cybercrime Has Grown Up and Diversified

By Nadav Morag, Ph.D., University Dean of Security Studies

CTU Homeland Security Degree - Keyboard CriminalsCybercrime is a growing problem in the United States and globally. One estimate suggests that cybercrime may cost the United States as much as $100 billion per year. Globally, that estimate may range into the hundreds of billions of dollars annually.   

In general, cybercrime – as opposed to cyber-espionage, which is directed against governments, or hacktivism, which is directed against either governments or corporations but carried out for political and social reasons rather than financial gain – can be broken down into two categories: crimes against businesses and crimes against individuals.

Cybercrime Against Businesses: Undermining the Economy

Broadly speaking, there are two kinds of cybercrimes directed at businesses. The first focuses on stealing intellectual property and selling it so others may profit from patents, unique designs, inventions, etc. produced by companies. In the corporate context, intellectual property can range from things like pharmaceuticals, to software packages, to new production methods for sneakers. Virtually anything a company’s research and development arm can come up with (patented or not) to improve the quality of a product, its marketing, the materials it is made of, and so on can comprise part of that company’s intellectual property. When that is stolen, it can result in significant losses as competitors domestically or overseas can then use this intellectual property, and thus diminish the market share of the company that spent the time and money to actually develop the particular product, process, formula, etc.

The other major way that cyber criminals can negatively impact businesses is through the theft of confidential business information. This can include a wide range of things, such as the personal data of employees and/or customers, business strategies, nondisclosure agreements between the company and other companies, confidential legal information about the company, or virtually anything else that, if made public or provided to a competitor, could damage the company’s operations and/or reputation. 

One of the challenges of coping with cybercrime against businesses is that it often goes unreported to law enforcement due to the fear, on the part of many companies, that news of a breach in the company’s computer networks will leak to the press and lead consumers to lose confidence in the company and move their business elsewhere. Companies can also be reluctant to share information with their competitors regarding computer attacks and breaches, even though the entire industry may stand to gain if competitors share information to help design better defensive strategies that benefit everyone. Instead, a company can be reluctant to share any potential proprietary information with its competitors so that those competitors do not use that information in order to gain more market share at the compromised business’ expense.  

Crimes Against Individuals: Defrauding Granny

Cybercrimes against individuals are often closely linked to crimes against businesses because they involve the theft of consumers’ or employees’ personal information and its fraudulent use in order to generate income for the cybercriminal. Cybercriminals regularly try to steal money from banks, credit card companies, insurance companies, and others through identity theft, the stealing of an individual’s personal identity and its fraudulent use by the criminal who uses it to take out a loan, apply for a credit card, etc. Cybercriminals also often attack unsuspecting individuals directly by luring them to websites or by getting them to open email attachments that then download malicious computer programs (known as “malware”) onto the victim’s computer, which allow the cybercriminal to access that individual’s computer in order to steal passwords, bank account information, social security numbers, or any other useful information that may be stored on the computer’s hard drive. Cybercriminals also regularly try to entice unsuspecting victims to provide passwords or other confidential information, usually via email, by masquerading as legitimate businesses. These are known as “phishing” attacks, or “spear phishing” when directed at particular individuals, often by name.

Individuals, of course, do not have the resources that large companies enjoy and, consequently, often do not know when they have inadvertently downloaded malware onto their computers and are about to become victims of identity theft. Hence, individuals are the Achilles’ heel of the cyber-defense system.  The best way to combat these types of criminal activities against individuals is to raise awareness of the threats, ensure that people are equipped with the latest anti-malware software packages, and educate people to be more suspicious of information they receive via email or on websites and not to provide personal information so readily.

Guarding Against Hype: The Economy Is Not Defenseless

As increasing amounts of business activity move to the Internet and other computer networks, criminals will follow, and a larger percentage of crime will involve cyber activities. At the same time, it should be kept in mind that the private sector is not utterly defenseless when it comes to coping with cybercrime. Major companies in every industry often employ top-notch cybersecurity personnel to protect their systems and investigate breaches. They also use antivirus and other software packages developed by cybersecurity companies, but the need for effective cybersecurity personnel is likely to be an ongoing feature of the 21st-century economy.  

CTU Faculty - Nadav MoragNadav Morag, Ph.D., is university dean of Security Studies at CTU. He works on projects for the Department of Homeland Security and the Department of Defense, and he is a published author on terrorism, security strategy and foreign policy. Connect with Dr. Morag on Twitter.

Image Credit: Flickr/Intel Free Press

Copyright © 2016 Colorado Technical University (CTU). All rights reserved. No information may be duplicated without CTU's permission. The CTU logo is a registered trademark of Career Education Corporation. CTU cannot guarantee employment or salary. Not all programs are available to residents of all states. Programs vary by location and modality; see catalog for details. Financial aid is available for those who qualify. See the Accreditation & Licensure section for information on the agencies that approve and regulate the school's programs, including relevant complaint procedures here. Find employment rates, financial obligations and other disclosures below.

Privacy Statement Legal Terms and Conditions Student Disclosures Sitemap Student Safety Contact Us

 (855) 230-0555

Terms and Conditions By providing your mobile number, you agree to receive text messages from Colorado Tech via its mobile text message provider.  You may opt out of receiving messages by texting the word STOP to 94576, or simply reply with the word STOP to any text message you receive from Colorado Tech. While CEC or its mobile text message provider will not charge end users for receiving/responding to promotional messages, depending on the terms of your mobile phone plan, you may incur a cost from your mobile service carrier to receive and respond to any promotional text messages (standard messaging and data rates/fees and other charges may apply).  Charges will appear on your mobile phone bill or will be deducted from pre-paid amounts.  Current participating/supported carriers are: Alltel, AT&T, Boost, Cellcom, Cellular One, Cellular South, Cincinnati Bell, Cricket, Element Wireless, Golden State Cellular, iWireless, Metro PCS, Nextel, nTelos, Plateau Wireless, Sprint, T-Mobile, US Cellular, Verizon Wireless, Viaero Wireless, Virgin, and more.×