"A risk assessment of the Piql Services" by FFI

measures in place are unable to detect. As a result, state X gains access to the designs of a weapon system developed by state Y, the major military power in the world. Though the designs are no longer state of the art by their standards, as state Y is so much further along all other states when it comes to military technology, the designs are a major breakthrough for state X to get their hands on. The malware copies these designs and sends them undetected to state X. State Y thus loses a major military advantage in possible future conflicts against state X.

Cause

Threat: Spyware installed on Piql computer system which duplicates the original file containing detailed descriptions of a new weapon system as it is prepared for printing.

Type of risk (Hazard/Threat)

Intentional (Yes/No/Both)

Yes.

State X is regarded as one of the world’s leading military powers, but it is still nowhere near the capacity of state Y, which has had the military upper hand for centuries now. Nevertheless, state X has formidable resources of its own and a perseverance which is unparalleled on the world stage when it comes to elevating their position. There are few things state X will not do to achieve this goal. Espionage in the form of spyware installed on Piql receiving and processing computer which sends the prepared files to the piqlWriter. State X has viewed the latest political developments with regards to its relations with state Y with much alarm. The relations have worsened considerably the past few months, and state X fears a military strike by state Y is imminent. State X thus uses espionage to gain further knowledge of state Y’s military capability, both to know what they are up against and to replicate state Y’s military equipment to be able to defend themselves. As one of the world’s leading military powers, state X has the resources, with regards to both finances and intelligence capabilities within the online realm, to go through with this kind of cyber operation.

Profile of actor (if intentional)

Description of cause

Competence and resources (if intentional)

User/value

User class

Public sensitive.

User type

Military, defence. Military world power, state Y.

Value

Military secrets regarding the designs of a weapon system. As the technology is unknown to all other state actors, the loss of this asset will cause a major reduction in state Y’s power position.

146

FFI-RAPPORT 16/00707

Made with FlippingBook Online newsletter