Table of Contents Table of Contents
Previous Page  148 / 177 Next Page
Information
Show Menu
Previous Page 148 / 177 Next Page
Page Background

146

FFI-RAPPORT 16/00707

measures in place are unable to detect. As a result, state X gains access to the designs of a weapon

system developed by state Y, the major military power in the world. Though the designs are no

longer state of the art by their standards, as state Y is so much further along all other states when it

comes to military technology, the designs are a major breakthrough for state X to get their hands

on. The malware copies these designs and sends them undetected to state X. State Y thus loses a

major military advantage in possible future conflicts against state X.

Cause

Type of risk

(Hazard/Threat)

Threat: Spyware installed on Piql computer system which duplicates the

original file containing detailed descriptions of a new weapon system as

it is prepared for printing.

Intentional

(Yes/No/Both)

Yes.

Profile of actor (if

intentional)

State X is regarded as one of the world’s leading military powers, but it

is still nowhere near the capacity of state Y, which has had the military

upper hand for centuries now. Nevertheless, state X has formidable

resources of its own and a perseverance which is unparalleled on the

world stage when it comes to elevating their position. There are few

things state X will not do to achieve this goal.

Description of cause

Espionage in the form of spyware installed on Piql receiving and

processing computer which sends the prepared files to the piqlWriter.

State X has viewed the latest political developments with regards to its

relations with state Y with much alarm. The relations have worsened

considerably the past few months, and state X fears a military strike by

state Y is imminent. State X thus uses espionage to gain further

knowledge of state Y’s military capability, both to know what they are

up against and to replicate state Y’s military equipment to be able to

defend themselves.

Competence and

resources (if

intentional)

As one of the world’s leading military powers, state X has the resources,

with regards to both finances and intelligence capabilities within the

online realm, to go through with this kind of cyber operation.

User/value

User class

Public sensitive.

User type

Military, defence. Military world power, state Y.

Value

Military secrets regarding the designs of a weapon system. As the

technology is unknown to all other state actors, the loss of this asset will

cause a major reduction in state Y’s power position.