Nation-states are increasingly resorting to IP theft. For instance through cyber espionage and insider access to undermine rival economies, gain leverage over critical infrastructure, influence cultural narratives, and secure competitive technological and military advantages. Academic institutions, government bodies, and private enterprises are all targets, albeit in different ways and sometimes for different reasons. Understanding the motives and tactics behind these activities is essential for developing effective regulations and countermeasures, and fostering awareness without inciting unnecessary fear. Alongside international public-private collaboration and intelligence sharing, these measures are vital for building societal resilience.
Whilst the motives behind data theft may appear straightforward—financial gains, technological advancement or circumventing international sanctions—they often vary, and demand tailored countermeasures. Comprehending these diverse motivations is crucial for organizations aiming to protect themselves.
A prevalent motive is economic disruption through IP theft, which accelerates an adversary’s technological development without the equivalent investment or considering ethical constraints and leaving original innovators at a strategic and financial disadvantage. Although a long-term strategy, it is aggressively pursued and combined with other hybrid warfare tactics. This frequently impacts academic institutions and tech, military, biotech, or critical infrastructure organizations, with dual-use technologies being especially vulnerable. Dual-use technologies, which could serve both civilian and military purposes, are attractive targets for state-sponsored IP theft. These technologies are used in fields like advanced semiconductors, artificial intelligence and quantum making them crucial for national competitiveness and security. What makes them extra vulnerable is that it is not always clear from the beginning that the technology is dual use, as military use may only become apparent later in the research process. Exploiting dual-use IP is used to halt or fault the innovative capacity of the victim, spurs technological development and military capabilities of the aggressor and curbs their dependence on other nations.
Another driver is the pursuit of resources (supplies or monetary), where access to the global market may be constrained by international sanctions. Some states resort to stealing IP from European or US based pharmaceutical companies to manufacture essential medicines domestically, thereby bypassing sanctions. These actors may bring these domestically produced medications to market in countries who do not participate in the sanctions, creating opportunities to boost their exports while securing access to medicine for their populations. North Korea, for example, has been attributed as the actor of ransomware attacks targeting U.S. healthcare facilities, and then using the ransoms paid by victims to finance its cyber-espionage operations. Such attacks disrupt organizations and may lead to inadvertent sanctions violations if ransom payments are made to sanctioned entities.
However, not all ransomware attacks are what they seem as some of these attacks, seemingly driven by financial motives, are fronts for data theft for espionage purposes. Even when ransoms are paid, stolen data can still be extracted and exploited without the victim being aware that data extraction was the goal of the operation. These operations are often executed by criminal groups acting as proxies, driven by financial or ideological motives. This underscores the blurred lines between state and non-state actors in hybrid warfare. These proxy groups can also operate in the physical domain, targeting the ports of Vlissingen and Eemshaven in the Netherlands for example as criminal groups in subversive crime as a smokescreen to create a position for espionage of NATO transports going through these harbors.
Lastly, data theft in critical infrastructure organizations can have great impact on an individual level. For example, when the electricity supply of the healthcare sector is hit or personal data at the local government is encrypted, stolen, or altered. However, a core concern is data being stolen to increase one’s information position to sabotage critical networks at a given time in the future. In these sectors Russia and China progressively join forces in their espionage efforts. While their motives differ (originally China focusing on IP theft, Russia on sabotage) Russia has developed an increased focus on IP theft due to their collaboration.
In the competitive world of academic research, sensitive knowledge or technologies can be stolen in various ways. For instance, through partnerships between universities, visiting scholars, cyber espionage, or even foreign-owned companies setting up shop on university campuses. The push for Open Science—where research findings, methods and data are shared openly for the benefit of science and society—remains a fundamental value in universities. As a result, convincing staff to follow stricter rules on collaboration and data sharing is proving to be a challenge. An individual professor not following policies could result in research findings with export control restrictions being shared with foreign actors without the necessary approval or mitigating measures. Universities are often hesitant to enforce stringent measures, fearing the loss of esteemed researchers to competing institutions. IP being stolen is not the only risk; visiting academics may also sabotage projects by altering data, hindering research and potentially changing the direction of research projects.
The risk extends beyond STEM disciplines, because humanities, law, and the social sciences are also targeted. Professors discussing sensitive topics, such as the Uyghur crisis, may face intimidation from students, while foreign academics may push for language changes that align with their national interests (e.g., replacing mentions of “Taiwan”) and academic staff being specifically targeted by disinformation campaigns to alter their worldviews. Especially China uses show of force by sending delegations to coerce students abroad into cooperation with the Chinese authorities. Knowledge institutions should be aware of this and create reporting mechanisms where their staff and students can be supported if this happens to them.
These pressures highlight the need for universities to formulate their own reasonable and pragmatic security policies, which adhere to national laws and allow them to remain an attractive (and not restrictive) employer. To avoid the waterbed effect of researchers joining the research institutions with the least strict screening and security policies, this creates an urgent need for internationally (perhaps Transatlantic) recognized “secure collaboration” frameworks that balance the demand for open, multinational cooperation with strict protocols to protect sensitive data without stifling academic freedom.