Trojan spoofing: A threat to critical infrastructure

Journal Title: Security and Defence Quarterly - Year 2023, Vol 42, Issue 2

Abstract

This article explores the phenomenon of location spoofing—where the spoofer is able to “teleport” systems in and out of defined locations, either for the purpose of infiltration into no-go zones or for the “teleportation” out of real, defined zones in the physical world. The research relied on a qualitative methodology, utilising academic research findings, media reports, hacker demonstrations, and secondary data from these sources, to situate the spoofing threat in the context of international security. This conceptual, argumentative essay finds that signal spoofing, the methods of which can be followed via online scripts, allows users the ability to overcome geographically defined territorial restrictions. This, as this article finds, allows violent actors to weaponise systems, such as unmanned aerial systems, potentially leading to the escalation of political tensions in extreme but unfortunately ever-frequent episodes. The article concludes that, while Trojan spoofing (in particular) poses a real and an existential threat to international security, it is only a sum-of-all parts in considering other threats to critical functions in society. If geofences are used as a single point of security to protect assets against hostile actors, managers need to be aware of the vulnerability of intrusion and the resulting geopolitical consequences.

Authors and Affiliations

Tegg Westbrook

Keywords

Related Articles

Pro-Daesh jihadist propaganda. A study of social media and video games

The fight that Europe and the West must wage against jihadist terrorism will take some time, but if we live up to our values of integration and democracy, we will come out of it soon. As Giovanni Falcone, the Italian jud...

Czechoslovak and Czech Republic weapon production and economic security in historic perspective

The main aim of this article is to describe the historical development of the weapon production and defence industrial base of Czechoslovakia and the Czech Republic, simultaneously the authors try to point out the import...

Characteristics of selected security threats in the Kurdistan region in Iraq

Since the end of World War I, the struggle with Kurdish separatism was a common problem for Iraq, Iran, Turkey and Syria. Due to the constant struggle and a series of favourable events, currently the most independent of...

The analysis of the acoustic wave velocity on the target localization accuracy

The accuracy of target localization using acoustic methods depends on atmospheric conditions. The acoustic wave velocity varies with fluctuation of atmospheric temperature, presure and humidity. Therefore, a mathematica...

Engagement of Executive Outcomes in Sierra Leone – utility assessment

The article explores combat related Private Military Companies (PMCs) that are authorised to engage in the forefront of the battlefield as dedicated force multipliers. To supplement empirical data with qualitative obser...

Download PDF file
  • EP ID EP718608
  • DOI https://doi.org/10.35467/sdq/164760
  • Views 29
  • Downloads 0

How To Cite

Tegg Westbrook (2023). Trojan spoofing: A threat to critical infrastructure. Security and Defence Quarterly, 42(2), -. https://europub.co.uk/articles/-A-718608