The Use Of Intellectual Property As An Instrument Of War

Since the beginning of the Russian invasion, Ukraine put together a team of volunteer hackers to conduct offensive operations and now, in response the the Russian invasion the Ukraine Ministry of Defence of Ukraine (GURMO) has leaked  critical documents about  the Russian Beloyarsk Nuclear Power Station which were stolen by the hackers. 

The act is believed to be the first time a hacked data has been leaked as an instrument of war to harm a nation.

GURMO has leaked a broad set of documents to writer Jeffery Carr, author of the book "Inside Cyber Warfare" to disseminate through his subscriber newsletter.  Beloyarsk's trade secrets may be valuable as it is home to the only two fast-breed nuclear reactors in commercial operation, the BN-600 and BN-800. Beloyarsk is run by the Rosenergoatom, the Russian state nuclear utility. Damaging their ability to do business is both an economic strike and an embarrassment for the broader nation as the leaks to Carr were done in a government ministry's name. 

While this is likely the first such use of intellectual property to damage a nation, especially during a combat situation, hack-and-leak operations are not an entirely new tool for nation-states. 

Leaks are often used as a sub-war way to needle adversaries, like when North Korea leaked documents from Sony Entertainment in its retaliation for the Kim Jung-un assassination comedy "The Interview," and Russia leaking emails from high-ranking Democrats in the run-up to the 2016 election. The release of the Beloyarsk documents dent Russia in a variety of ways. Immediately it tells Russia that intelligence has access to various pieces of infrastructure. It embarrasses a country that likes to boast about its scientific might. 

Hack-and-leak IP operations may offer one other substantial benefit and send a strong signal to critical infrastructure without actually harming people by damaging critical infrastructure.

One significant effect of Russia’s invasion of Ukraine is that it has prompted a significant rethink of military strategy, both for the EU and for NATO, with the security threats presented by Moscow’s unexpected military aggression the most pressing issue

Euractiv EU:    SC Magazine:      Jeffrey Car / Substack:      The Conversation:    Daily Advent:  

You Might Also Read: 

Cyber Threats & Nuclear Dangers:

 

« LAPSUS$ Hackers Claim Responsibility For Large Scale Corporate Attacks
The Global Cyber Security Market Set To Grow By $190 Billion »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

2|SEC Consulting (2-SEC)

2|SEC Consulting (2-SEC)

At 2|SEC Consulting, we deliver an end-to-end service of cyber and information security solutions which are tailored to each client’s exact security needs.

F-Response

F-Response

F-Response is a software utility that enables an investigator to conduct live Forensics, Data Recovery, and eDiscovery over an IP network using their tools of choice.

a1qa

a1qa

a1qa specializes in the delivery of full-cycle software QA and application testing services.

AVG Technologies

AVG Technologies

AVG is focused on providing home and business computer users with the most comprehensive and proactive protection against computer security threats.

GuardiCore

GuardiCore

GuardiCore is an innovator in internal data center security and breach detection and is transforming security inside data centers and clouds.

Vysk Communications

Vysk Communications

Vysk is an award-winning mobile security firm that has developed the world’s most secure system for voice communication.

Secure Code Warrior

Secure Code Warrior

Secure your code from the start with gamified, scalable online secure coding training for software developers.

Ntirety

Ntirety

Ntirety Managed Security Services offer enterprise businesses the advanced tools, processes, and support to ensure your infrastructure, networks, and mission-critical applications are secure.

LogicHub

LogicHub

LogicHub is built on the principle that every decision process for threat detection and response can and should be automated.

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS) is a state-owned commercial enterprise providing confidential communication, trust services and services in the field of information protection.

US Digital Corps

US Digital Corps

The U.S. Digital Corps is a new two-year fellowship for early-career technologists where you will work every day to make a difference in critical impact areas including cybersecurity.

IoTeX

IoTeX

Building the connected world. IoTeX is a fast, secure, and decentralized platform that connects real world devices/data to the blockchain.

Primus Institute of Technology

Primus Institute of Technology

At Primus Institute of Technology our mission is to inspire, support, and empower current and aspiring IT professionals through training and career development workshops.

Strategic Technology Solutions (STS)

Strategic Technology Solutions (STS)

Strategic Technology Solutions specialize in providing Cybersecurity and Managed IT Services to the legal industry.

Muscope Cybersecurity

Muscope Cybersecurity

Muscope CYSR platform performs a risk assessment and offers a comprehensive overview of the potential cyber attack risks.

Longbow Security

Longbow Security

Longbow automates root cause for your application and cloud risks, enabling teams with intelligent remediation actions that reduce the most risk with the least effort.