Trojan spoofing: A threat to critical infrastructure
Journal Title: Security and Defence Quarterly - Year 2023, Vol 42, Issue 2
Abstract
This article explores the phenomenon of location spoofing—where the spoofer is able to “teleport” systems in and out of defined locations, either for the purpose of infiltration into no-go zones or for the “teleportation” out of real, defined zones in the physical world. The research relied on a qualitative methodology, utilising academic research findings, media reports, hacker demonstrations, and secondary data from these sources, to situate the spoofing threat in the context of international security. This conceptual, argumentative essay finds that signal spoofing, the methods of which can be followed via online scripts, allows users the ability to overcome geographically defined territorial restrictions. This, as this article finds, allows violent actors to weaponise systems, such as unmanned aerial systems, potentially leading to the escalation of political tensions in extreme but unfortunately ever-frequent episodes. The article concludes that, while Trojan spoofing (in particular) poses a real and an existential threat to international security, it is only a sum-of-all parts in considering other threats to critical functions in society. If geofences are used as a single point of security to protect assets against hostile actors, managers need to be aware of the vulnerability of intrusion and the resulting geopolitical consequences.
Authors and Affiliations
Tegg Westbrook
Insider attacks as one of the main threats to resolute support personnel in Afghanistan
From July 2015, the International Security Assistance Force (ISAF) moved into the Resolute Support Mission (RSM) and started acting in the supporting role. From that time, one of the most important Security Force Assista...
The evolution of the Hungarian security policy thinking between 1989-1999, with a special view on the Hungarian Defence Forces.
Hungarian security policy thinking went through basic and crucial changes in the last two decades. As a result, we can see a kind of "evolution", which starts from a former Soviet satellite state status through to a peri...
Report from the workshop on best practices within the frames of the DEEP Georgia.
----------
Geopolitical consequences arising from involvement of Russia in the conflict in Ukraine
The crisis in eastern Ukraine and Crimea is undoubtedly one of the greatest challenges of security currently facing the international community. In pursuing its objectives, the state is often guided by different motives,...
An evaluation of Anti-Terrorism laws in Pakistan: Lessons from the past and challenges for the future
Terrorism has changed the national and international security milieu over the last few years; however, there have been metamorphoses in the phenomenon of defining security in light of new threats of terrorism. This resea...