The Use Of Intellectual Property As An Instrument Of War

Since the beginning of the Russian invasion, Ukraine put together a team of volunteer hackers to conduct offensive operations and now, in response the the Russian invasion the Ukraine Ministry of Defence of Ukraine (GURMO) has leaked  critical documents about  the Russian Beloyarsk Nuclear Power Station which were stolen by the hackers. 

The act is believed to be the first time a hacked data has been leaked as an instrument of war to harm a nation.

GURMO has leaked a broad set of documents to writer Jeffery Carr, author of the book "Inside Cyber Warfare" to disseminate through his subscriber newsletter.  Beloyarsk's trade secrets may be valuable as it is home to the only two fast-breed nuclear reactors in commercial operation, the BN-600 and BN-800. Beloyarsk is run by the Rosenergoatom, the Russian state nuclear utility. Damaging their ability to do business is both an economic strike and an embarrassment for the broader nation as the leaks to Carr were done in a government ministry's name. 

While this is likely the first such use of intellectual property to damage a nation, especially during a combat situation, hack-and-leak operations are not an entirely new tool for nation-states. 

Leaks are often used as a sub-war way to needle adversaries, like when North Korea leaked documents from Sony Entertainment in its retaliation for the Kim Jung-un assassination comedy "The Interview," and Russia leaking emails from high-ranking Democrats in the run-up to the 2016 election. The release of the Beloyarsk documents dent Russia in a variety of ways. Immediately it tells Russia that intelligence has access to various pieces of infrastructure. It embarrasses a country that likes to boast about its scientific might. 

Hack-and-leak IP operations may offer one other substantial benefit and send a strong signal to critical infrastructure without actually harming people by damaging critical infrastructure.

One significant effect of Russia’s invasion of Ukraine is that it has prompted a significant rethink of military strategy, both for the EU and for NATO, with the security threats presented by Moscow’s unexpected military aggression the most pressing issue

Euractiv EU:    SC Magazine:      Jeffrey Car / Substack:      The Conversation:    Daily Advent:  

You Might Also Read: 

Cyber Threats & Nuclear Dangers:

 

« LAPSUS$ Hackers Claim Responsibility For Large Scale Corporate Attacks
The Global Cyber Security Market Set To Grow By $190 Billion »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Hewlett Packard Enterprise (HPE)

Hewlett Packard Enterprise (HPE)

HPE is an information technology company focused on Enterprise networking, Services and Support.

Korea Information Security Industry Association (KISIA)

Korea Information Security Industry Association (KISIA)

KISIA is a non-profit organization for the information security industry in Korea.

Corsa Security

Corsa Security

Corsa Security is leading the transformation of network security with a private cloud approach that helps scale network security services with unwavering performance and flexibility.

StepStone

StepStone

StepStone is one of the leading online job platforms in Germany, and other countries, covering all industry sectors including IT and cybersecurity.

TechRate

TechRate

Techrate is an analytics agency focused on blockchain technology and engineering. Or expertise includes security and technical audits of projects.

AUREA Technology

AUREA Technology

The photon counter SPD_OEM_NIR from AUREA Technology is designed for quantum key distribution at telecom wavelengths.

Voxility

Voxility

Voxility provides Infrastructure-as-a-Service in the biggest Internet hubs in the world.

stackArmor

stackArmor

stackArmor specializes in compliance and security-focused solutions delivered using our Agile Cloud Transformation (ACT) methodology.

Purple Knight

Purple Knight

Purple Knight is a free Active Directory security assessment tool built and managed by an elite group of Microsoft identity experts.

ClearShark

ClearShark

Since 2001, ClearShark has been a go-to adviser in the U.S. Public Sector for creating customized and integrated solutions for the most secure of networks.

Globesecure Technologies

Globesecure Technologies

Globesecure Technologies is a networks and cyber security company. We are here to resolve business security challenges and secure the digital transformation journey of our clients.

Cybastion

Cybastion

Cybastion develops robust world-class cybersecurity solutions tailored to suit the needs of different businesses, governments and public sector entities.

One Step Secure IT

One Step Secure IT

One Step provide Managed IT Services, Cybersecurity Protections, and Compliance to businesses in the USA nationwide.

Chorology

Chorology

Chorology is a leading provider of intelligently automated, data compliance and posture enforcement solutions.

RESTIV Technology

RESTIV Technology

RESTIV Compliance Copilot is your partner in continuous compliance. Real-time monitoring, continuous testing, and transparent evidence—no surprises, just peace of mind.

Cytracom

Cytracom

Cytracom delivers powerful yet intuitive solutions that enable MSPs and ITSPs to meet the challenges of security, compliance, and connectivity.