The Use Of Intellectual Property As An Instrument Of War

Since the beginning of the Russian invasion, Ukraine put together a team of volunteer hackers to conduct offensive operations and now, in response the the Russian invasion the Ukraine Ministry of Defence of Ukraine (GURMO) has leaked  critical documents about  the Russian Beloyarsk Nuclear Power Station which were stolen by the hackers. 

The act is believed to be the first time a hacked data has been leaked as an instrument of war to harm a nation.

GURMO has leaked a broad set of documents to writer Jeffery Carr, author of the book "Inside Cyber Warfare" to disseminate through his subscriber newsletter.  Beloyarsk's trade secrets may be valuable as it is home to the only two fast-breed nuclear reactors in commercial operation, the BN-600 and BN-800. Beloyarsk is run by the Rosenergoatom, the Russian state nuclear utility. Damaging their ability to do business is both an economic strike and an embarrassment for the broader nation as the leaks to Carr were done in a government ministry's name. 

While this is likely the first such use of intellectual property to damage a nation, especially during a combat situation, hack-and-leak operations are not an entirely new tool for nation-states. 

Leaks are often used as a sub-war way to needle adversaries, like when North Korea leaked documents from Sony Entertainment in its retaliation for the Kim Jung-un assassination comedy "The Interview," and Russia leaking emails from high-ranking Democrats in the run-up to the 2016 election. The release of the Beloyarsk documents dent Russia in a variety of ways. Immediately it tells Russia that intelligence has access to various pieces of infrastructure. It embarrasses a country that likes to boast about its scientific might. 

Hack-and-leak IP operations may offer one other substantial benefit and send a strong signal to critical infrastructure without actually harming people by damaging critical infrastructure.

One significant effect of Russia’s invasion of Ukraine is that it has prompted a significant rethink of military strategy, both for the EU and for NATO, with the security threats presented by Moscow’s unexpected military aggression the most pressing issue

Euractiv EU:    SC Magazine:      Jeffrey Car / Substack:      The Conversation:    Daily Advent:  

You Might Also Read: 

Cyber Threats & Nuclear Dangers:

 

« LAPSUS$ Hackers Claim Responsibility For Large Scale Corporate Attacks
The Global Cyber Security Market Set To Grow By $190 Billion »

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Bishop Fox

Bishop Fox

Bishop Fox provides tailored security consulting services to companies across all industries. Our customers include many of the top organizations in the world.

Citrix

Citrix

Citrix provide virtualisation, networking, SaaS and cloud solutions including Secure Networking (Netscaler) and Enterprise Mobility Management (XenMobile).

Lirex

Lirex

Lirex offer consulting and outsourcing services, complete design, construction and maintenance of ICT solutions and systems including cybersecurity.

QuickLaunch

QuickLaunch

QuickLaunch transforms how cloud-savvy institutions and companies manage human and device authentication, authorization, access control and integration.

Phosphorous Cybersecurity

Phosphorous Cybersecurity

Phosphorus has fully automated remediation of the two biggest IoT vulnerabilities, out of date firmware and default credentials.

Cysiv

Cysiv

Cysiv SOC-as-a-Service combines all the elements of an advanced, proactive, threat hunting SOC, with a managed security stack for hybrid cloud, network, and endpoint security.

Threat Status

Threat Status

Threat Status are a Threat Intelligence company. We are the developers of Trillion. A cloud based Security As A Service (SaaS) platform.

AppGate

AppGate

AppGate brings together a set of differentiated cloud- and hybrid-ready security and analytics products and services.

Duality Technologies

Duality Technologies

Duality Technologies combine Advanced Cryptography with Data Science to deliver High-Performance Privacy-Protecting Computing to Regulated Industries.

SecSign Technologies

SecSign Technologies

SecSign Technologies delivers user authentication, messaging, file sharing, and file storage with next generation security for company networks, websites, platforms, and devices.

Quantum Armor

Quantum Armor

Quantum Armor is a next-gen cyber security monitoring platform that allows you to continuously stay aware of your security posture, and proactively spot trends, vulnerabilities and potential attacks.

Dhound

Dhound

Dhound is a cybersecurity company providing web application penetration testing.

Saepio Solutions

Saepio Solutions

Saepio promote an all-encompassing approach to cybersecurity, ensuring the appropriate balance of budget and resource across Policy, Product and People.

Navisite

Navisite

Navisite is a combination of eight respected IT consulting and managed service providers that were brought together under the Navisite brand.

Strike Security

Strike Security

Strike Security offers a continuous penetration testing platform that combines automation with ethical hackers.

Astrill VPN

Astrill VPN

Astrill VPN is a Seychelles based Virtual Private Network(VPN) Company.