

146
FFI-RAPPORT 16/00707
measures in place are unable to detect. As a result, state X gains access to the designs of a weapon
system developed by state Y, the major military power in the world. Though the designs are no
longer state of the art by their standards, as state Y is so much further along all other states when it
comes to military technology, the designs are a major breakthrough for state X to get their hands
on. The malware copies these designs and sends them undetected to state X. State Y thus loses a
major military advantage in possible future conflicts against state X.
Cause
Type of risk
(Hazard/Threat)
Threat: Spyware installed on Piql computer system which duplicates the
original file containing detailed descriptions of a new weapon system as
it is prepared for printing.
Intentional
(Yes/No/Both)
Yes.
Profile of actor (if
intentional)
State X is regarded as one of the world’s leading military powers, but it
is still nowhere near the capacity of state Y, which has had the military
upper hand for centuries now. Nevertheless, state X has formidable
resources of its own and a perseverance which is unparalleled on the
world stage when it comes to elevating their position. There are few
things state X will not do to achieve this goal.
Description of cause
Espionage in the form of spyware installed on Piql receiving and
processing computer which sends the prepared files to the piqlWriter.
State X has viewed the latest political developments with regards to its
relations with state Y with much alarm. The relations have worsened
considerably the past few months, and state X fears a military strike by
state Y is imminent. State X thus uses espionage to gain further
knowledge of state Y’s military capability, both to know what they are
up against and to replicate state Y’s military equipment to be able to
defend themselves.
Competence and
resources (if
intentional)
As one of the world’s leading military powers, state X has the resources,
with regards to both finances and intelligence capabilities within the
online realm, to go through with this kind of cyber operation.
User/value
User class
Public sensitive.
User type
Military, defence. Military world power, state Y.
Value
Military secrets regarding the designs of a weapon system. As the
technology is unknown to all other state actors, the loss of this asset will
cause a major reduction in state Y’s power position.