Trojan spoofing: A threat to critical infrastructure

Journal Title: Security and Defence Quarterly - Year 2023, Vol 42, Issue 2

Abstract

This article explores the phenomenon of location spoofing—where the spoofer is able to “teleport” systems in and out of defined locations, either for the purpose of infiltration into no-go zones or for the “teleportation” out of real, defined zones in the physical world. The research relied on a qualitative methodology, utilising academic research findings, media reports, hacker demonstrations, and secondary data from these sources, to situate the spoofing threat in the context of international security. This conceptual, argumentative essay finds that signal spoofing, the methods of which can be followed via online scripts, allows users the ability to overcome geographically defined territorial restrictions. This, as this article finds, allows violent actors to weaponise systems, such as unmanned aerial systems, potentially leading to the escalation of political tensions in extreme but unfortunately ever-frequent episodes. The article concludes that, while Trojan spoofing (in particular) poses a real and an existential threat to international security, it is only a sum-of-all parts in considering other threats to critical functions in society. If geofences are used as a single point of security to protect assets against hostile actors, managers need to be aware of the vulnerability of intrusion and the resulting geopolitical consequences.

Authors and Affiliations

Tegg Westbrook

Keywords

Related Articles

Students' opinion on the academic curriculum in military classes

This article includes the results of the author`s research into the curriculum in military classes in the opinion of student class participants. The below study looks at the results of pilot studies implementing a diagno...

The essence of evaluation of the crisis response operation.

Crisis response operations (CROs) become the universal means used to solve a crisis situation. Their goal is preventing a potential conflict, responding and removing the effects of conflict and restoring pre-crisis situa...

Tackling cyberspace threats – The international approach

The fact that NATO has acknowledged cyberspace as the fifth dimension of combat operations indicates that this problem issue is really topical and is pointing at the direction from which the possible threat can be expect...

Notion of strategic national security management

An analytical description of the community, national strategic management of national security as the foundation for shaping the security of the state with the display of combined actions of diplomacy, administration and...

Download PDF file
  • EP ID EP718608
  • DOI https://doi.org/10.35467/sdq/164760
  • Views 72
  • Downloads 0

How To Cite

Tegg Westbrook (2023). Trojan spoofing: A threat to critical infrastructure. Security and Defence Quarterly, 42(2), -. https://europub.co.uk/articles/-A-718608