Trojan spoofing: A threat to critical infrastructure
Journal Title: Security and Defence Quarterly - Year 2023, Vol 42, Issue 2
Abstract
This article explores the phenomenon of location spoofing—where the spoofer is able to “teleport” systems in and out of defined locations, either for the purpose of infiltration into no-go zones or for the “teleportation” out of real, defined zones in the physical world. The research relied on a qualitative methodology, utilising academic research findings, media reports, hacker demonstrations, and secondary data from these sources, to situate the spoofing threat in the context of international security. This conceptual, argumentative essay finds that signal spoofing, the methods of which can be followed via online scripts, allows users the ability to overcome geographically defined territorial restrictions. This, as this article finds, allows violent actors to weaponise systems, such as unmanned aerial systems, potentially leading to the escalation of political tensions in extreme but unfortunately ever-frequent episodes. The article concludes that, while Trojan spoofing (in particular) poses a real and an existential threat to international security, it is only a sum-of-all parts in considering other threats to critical functions in society. If geofences are used as a single point of security to protect assets against hostile actors, managers need to be aware of the vulnerability of intrusion and the resulting geopolitical consequences.
Authors and Affiliations
Tegg Westbrook
Preparation of Polish police officers for peace missions
Conflicts in the 21st century have forced qualitative changes in the way of training missionary personnel. Police forces are currently used in various joint operations, which include, among others, elements of the fight...
Protection of critical infrastructure in Norway – factors, actors and systems
The main aim of this article is to examine how the issue of protecting critical infrastructure is addressed in Norway. To answer this question, the article addresses two important sub-questions – what is to be understood...
Social structure determinants of Polish military manpower
This paper sets out to identify the key elements of Polish social structure that are critical to the manpower of the Polish Armed Forces. So far, there has been little discussion, in either the literature or ongoing publ...
Fitness OSINT: Identifying and tracking military and security personnel with fitness applications for intelligence gathering purposes
The objective of this paper is to demonstrate the possibility of tracking and identifying military and other security personnel, operating in secretive or restricted areas. Such exposure might have dire consequences from...
Limitations in the airspace sovereignty of states in connection with space activity
The launch of the Soviet Sputnik in 1957 resulted in the emergence of two legal concepts concerning spacefl ight. The first of them concerned harmless passage through airspace subjected to the sovereignty of states, the...