Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.

Article

Download file Download BibTeX

Title

Trojan spoofing: A threat to critical infrastructure

Authors

[ 1 ] Department of Safety, Economics, and Planning, University of Stavanger, Kjell Arholms Gate 41, 4021, Stavanger, Norway

Year of publication

2023

Published in

Security and Defence Quarterly

Journal year: 2023 | Journal volume: vol. 42 | Journal number: no 2

Article type

scientific article

Publication language

polish

Keywords
PL
  • Infrastruktura krytyczna
  • Przestępczość
  • Wojna informacyjna
  • Zagrożenia
EN
  • Critical infrastructure
  • Information war
  • Threats
Abstract

EN This article explores the phenomenon of location spoofing—where the spoofer is able to “teleport” systems in and out of defined locations, either for the purpose of infiltration into no-go zones or for the “teleportation” out of real, defined zones in the physical world. The research relied on a qualitative methodology, utilising academic research findings, media reports, hacker demonstrations, and secondary data from these sources, to situate the spoofing threat in the context of international security. This conceptual, argumentative essay finds that signal spoofing, the methods of which can be followed via online scripts, allows users the ability to overcome geographically defined territorial restrictions. This, as this article finds, allows violent actors to weaponise systems, such as unmanned aerial systems, potentially leading to the escalation of political tensions in extreme but unfortunately ever-frequent episodes. The article concludes that, while Trojan spoofing (in particular) poses a real and an existential threat to international security, it is only a sum-of-all parts in considering other threats to critical functions in society. If geofences are used as a single point of security to protect assets against hostile actors, managers need to be aware of the vulnerability of intrusion and the resulting geopolitical consequences.

Date of online publication

21.05.2023

Pages (from - to)

1 - 15

DOI

10.35467/sdq/164760

URL

https://securityanddefence.pl/Trojan-spoofing-A-threat-to-critical-infrastructure,164760,0,2.html

Comments

Corresponding author Tegg Westbrook Department of Safety, Economics, and Planning, University of Stavanger, Kjell Arholms gate 41, 4021, Stavanger, Norway

License type

CC BY (attribution alone)

Open Access Mode

open journal

Open Access Text Version

final published version

Full text of article

Download file

Access level to full text

public

Ministry points / journal

100