Opening Cross: Data: Currency of the New Age (or "Quantum Dawn 2: Revenge of the Hackers")
It’s hard to believe we’re already halfway through 2013—which many thought would be a return to form for the industry. And while it has yielded a return for indicators like the Dow Jones Industrial Average and some banks that reported record profits, that isn’t trickling down to many divisions that keep the firms running.
In an electronic age, what keeps many firms running is security. In everyday life, security software safeguards our financial information when shopping online, to prevent identity theft, or hackers hijacking our email or computers. Capital markets are much the same, but with a lot more data and money at stake. Client data is sacrosanct, and it’s the potential harm someone can do with that information that offers a scary scenario for brilliant yet unscrupulous minds.
In a virtual roundtable in the first issue of IMD this year, I predicted serious impacts from cyber-terrorism events on major exchanges, and a regulatory “firewall” for real-time monitoring against any disruptive activity. And it seems that at least some of that prediction is coming true.
On July 18, the Securities and Financial Markets Association organized a cyber-security preparedness exercise—with the summer blockbuster-like title Quantum Dawn 2—involving 50 organizations, including financial firms, exchanges, utilities, the US Department of the Treasury, the Securities and Exchange Commission, the Department of Homeland Security, and the FBI, to test the industry’s crisis response and communications plans in the event of a “systematic cyber attack.”
The financial markets’ ability to withstand these attacks is not only a security requirement; it also has a big impact on the trust placed in its institutions by investors, which has already deteriorated in the US in the second quarter of 2013, according to Thomson Reuters’ TRust Index—possibly a result of concerns over quantitative easing and interest rates. Trust in Asian financial institutions also deteriorated, ostensibly due to fears about China’s “shadow banking” system and a liquidity crisis. But other factors are affecting the region’s trustworthiness: According to a report from Hollywood, Fla.-based Prolexic Technologies, a provider of Distributed Denial of Service (DDOS) attack protection, China is the largest source of DDOS attacks, which increased 33 percent over 2012, while duration increased 123 percent, and bandwidth utilized increased 925 percent.
While many attacks swamp organizations’ websites with traffic to force them offline, others are more sophisticated, designed to disrupt a company’s—or marketplace’s—operations, while others simply look for ways to steal data. For example, hackers compromised one of Nasdaq’s investor discussion forum sites last Monday, July 18. And Nasdaq isn’t alone. According to a report from IOSCO and the World Federation of Exchanges, 53 percent of exchanges surveyed experienced a cyber attack in the past year, including one on the National Market System that made corporate filing information unavailable, making securities illiquid and forcing a trading halt.
In the latest case, the hackers made off with investors’ login details to the forum—though not access any other Nasdaq systems—before the exchange detected the breach and alerted forum members. This data is useful if people use the same passwords elsewhere. But also, if you consider what precipitated the so-called Hash Crash, imagine hacking the Twitter feeds of influential investors who may lack the real-time oversight of the Associated Press: a fake tweet could exercise an disastrous amount of influence on sudden price movements. Sentiment analysis providers filter out unverified tweets, but can they handle fake—but credible—messages from a verified source?
As these sources of insight emerge as a new generation of market data, they bring new potential for market manipulation. Just as traders are seeking to find value from all and any information source to exploit the markets, others are doing exactly the same with illegally-obtained data to disrupt those same markets.
Only users who have a paid subscription or are part of a corporate subscription are able to print or copy content.
To access these options, along with all other subscription benefits, please contact info@waterstechnology.com or view our subscription options here: http://subscriptions.waterstechnology.com/subscribe
You are currently unable to print this content. Please contact info@waterstechnology.com to find out more.
You are currently unable to copy this content. Please contact info@waterstechnology.com to find out more.
Copyright Infopro Digital Limited. All rights reserved.
As outlined in our terms and conditions, https://www.infopro-digital.com/terms-and-conditions/subscriptions/ (point 2.4), printing is limited to a single copy.
If you would like to purchase additional rights please email info@waterstechnology.com
Copyright Infopro Digital Limited. All rights reserved.
You may share this content using our article tools. As outlined in our terms and conditions, https://www.infopro-digital.com/terms-and-conditions/subscriptions/ (clause 2.4), an Authorised User may only make one copy of the materials for their own personal use. You must also comply with the restrictions in clause 2.5.
If you would like to purchase additional rights please email info@waterstechnology.com
More on Emerging Technologies
An inside look: How AI powered innovation in the capital markets in 2024
From generative AI and machine learning to more classical forms of AI, banks, asset managers, exchanges, and vendors looked to large language models, co-pilots, and other tools to drive analytics.
Asset manager Saratoga uses AI to accelerate Ridgeline rollout
The tech provider’s AI assistant helps clients summarize research, client interactions, report generation, as well as interact with the Ridgeline platform.
LSEG rolls out AI-driven collaboration tool, preps Excel tie-in
Nej D’Jelal tells WatersTechnology that the rollout took longer than expected, but more is to come in 2025.
The Waters Cooler: ’Tis the Season!
Everyone is burned out and tired and wants to just chillax in the warm watching some Securities and Exchange Commission videos on YouTube. No? Just me?
It’s just semantics: The web standard that could replace the identifiers you love to hate
Data ontologists say that the IRI, a cousin of the humble URL, could put the various wars over identity resolution to bed—for good.
T. Rowe Price’s Tasitsiomi on the pitfalls of data and the allures of AI
The asset manager’s head of AI and investments data science gets candid on the hype around generative AI and data transparency.
As vulnerability patching gets overwhelming, it’s no-code’s time to shine
Waters Wrap: A large US bank is going all in on a no-code provider in an effort to move away from its Java stack. The bank’s CIO tells Anthony they expect more CIOs to follow this dev movement.
J&J debuts AI data contracts management tool
J&J’s new GARD service will use AI to help data pros query data contracts and license agreements.