PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Trojan spoofing: A threat to critical infrastructure

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
This article explores the phenomenon of location spoofing—where the spoofer is able to “teleport” systems in and out of defined locations, either for the purpose of infiltration into no-go zones or for the “teleportation” out of real, defined zones in the physical world. The research relied on a qualitative methodology, utilising academic research findings, media reports, hacker demonstrations, and secondary data from these sources, to situate the spoofing threat in the context of international security. This conceptual, argumentative essay finds that signal spoofing, the methods of which can be followed via online scripts, allows users the ability to overcome geographically defined territorial restrictions. This, as this article finds, allows violent actors to weaponise systems, such as unmanned aerial systems, potentially leading to the escalation of political tensions in extreme but unfortunately ever-frequent episodes. The article concludes that, while Trojan spoofing (in particular) poses a real and an existential threat to international security, it is only a sum-of-all parts in considering other threats to critical functions in society. If geofences are used as a single point of security to protect assets against hostile actors, managers need to be aware of the vulnerability of intrusion and the resulting geopolitical consequences.
Rocznik
Strony
1--15
Opis fizyczny
Bibliogr. 50 poz.
Twórcy
  • Department of Safety, Economics, and Planning, University of Stavanger, Kjell Arholms Gate 41, 4021, Stavanger, Norway
Bibliografia
  • 1. Adde N. (2021) ‘Calls grow to find back up systems for GPS’, National Defense, 11 February. Available at: .nationaldefensemagazine.org/articles/2021/2/11/calls-grow-to-find-back-up-systems-for-gps (Accessed: 11 April 2023).
  • 2. Almohammad A. and Speckhard A. (2017) ISIS drones: evolution, leadership, bases, operations and logistics. United States: International Centre for the Study of Violent Extremism. Available at: .icsve.org/isis-drones-evolution-leadership-bases-operations-and-logistics/ (Accessed: 3 May, 2023).
  • 3. Associated Press (2011) The Al-Qaida papers – Drones. Available at: https://cryptome.org/2013/02/al-qaida-drones.pdf (Accessed: 6 July 2022).
  • 4. BBC News (2019) Saudi oil attacks: US blames Iran for drone strikes on two sites. Available at: .bbc.co.uk/news/world-middle-east-49705197 (Accessed: 2 December 2022).
  • 5. BBC News (2023) Kremlin drone attack: Russia accuses Ukraine of trying to assassinate Putin. Available at: https://.bbc.com/news/world-europe-65471904 (Accessed: 3 May 2023).
  • 6. Bhatti J.A., Shepard D.P. and Humphreys T.E. (2012) ‘Drone hack: spoofing attack demonstration on a civilian unmanned aerial vehicle’, GPS World, 23, pp. 30–33. Available at: https://radionavlab.ae.utexas.edu/images/stories/files/papers/drone_hack_shepard.pdf (Accessed: 3 May, 2023).
  • 7. Brewster T. (2015) ‘Watch GPS attacks that can kill DJI drones or bypass White House ban’, Forbes, 8 August. Available at: .forbes.com/sites/thomasbrewster/2015/08/08/qihoo-hacks-drone-gps/#7f6c16cf2bf5 (Accessed: 3 May, 2023).
  • 8. Bradbury D. (2019) ‘Tesla 3 navigation system fooled with GPS spoofing’, Naked Security (SOPHOS). Available at: https://nakedsecurity.sophos.com/2019/06/27/researchers-fool-tesla-3-navigation-system-with-gps-spoofing/ (Accessed: 11 April 2023).
  • 9. Bunker R.J. (2015, August) Terrorist and insurgent unmanned aerial vehicles: Use, potentials, and military implications. Carlisle, PA: Strategic Studies Institute, US Army War College. Available at: https://.ausa.org/publications/role-drones-future-terrorist-attacks (Accessed: 2 December 2022).
  • 10. C4ADS (2019) Above us only stars: Exposing GPS spoofing in Russia and Syria, pp. 1–66. Available at: https://.c4reports.org/aboveusonlystars (Accessed: 2 December 2022).
  • 11. Daniels J.P. (2018) ‘Venezuela’s Nicolás Maduro survives apparent assassination attempt’, The Guardian, 5 August. Available at: .theguardian.com/world/2018/aug/04/nicolas-maduros-speech-cut-short-while-soldiers-scatter (Accessed: 2 December 2022).
  • 12. Farivar C. (2013) ‘Professor fools $80M superyacht’s GPS receiver on the high seas’, ArsTechnica, 30 July. Available at: arstechnica.com/information-technology/2013/07/professor-spoofs-80m-superyachts-gps-receiver-on-the-high-seas/ (Accessed: 2 December 2022).
  • 13. G4S (2022) Drones: Threat from above. Available at: https://.g4s.com/en-ca/-/media/g4s/canada/files/whitepapers/usa/drones_threat_from_above.ashx?la=en&hash=A5EE00E0402E0CB50FDA127500636B53 (Accessed: 16 October 2020).
  • 14. Government Office of Sweden, Ministry of Enterprise and Innovation (2017) Handshake on digitalisation and geofencing. Available at: .government.se/articles/2017/05/handshake-on-digitalisation-and-geofencing/ (Accessed: 2 December 2022).
  • 15. Goward D. (2019) ‘Jammers at dachas add to Russia’s ability to silence GPS’, GPS World, 20 June. Available at: .gpsworld.com/jammers-at-dachas-add-to-russias-ability-to-silence-gps/ (Accessed: 2 December 2022).
  • 16. Gozzi L. (2023) ‘Ukraine war: Zelensky visits The Hague as fresh blasts rock Kyiv’, BBC News, 4 May. Available at: .bbc.com/news/world-europe-65478242 (Accessed: 4 May 2023).
  • 17. Greenberg A. (2016) ‘Hackers fool Tesla S’s autopilot to hide and spoof obstacles’, Wired, 4 August. Available at: .wired.com/2016/08/hackers-fool-tesla-ss-autopilot-hide-spoof-obstacles/ (Accessed: 11 April 2023).
  • 18. Hambling D. (2022) ‘Ukrainian Kamikaze drone strike sets Russian oil facility ablaze (updated — Attack drone may have been made in China)’, Forbes, 22 June. Available at: .forbes.com/sites/davidhambling/2022/06/22/ukrainian-kamikaze-drone-strike-sets-russian-oil-facility-ablaze/?sh=768cea4b7a99 (Accessed: 2 December 2022).
  • 19. HelpNet Security (2019) Research shows Tesla Model 3 and Model S are vulnerable to GPS spoofing attacks. Available at: .helpnetsecurity.com/2019/06/19/tesla-gps-spoofing-attacks/ (Accessed: 3 May, 2023).
  • 20. Hoenig M. (2014) ‘Hezbollah and the use of drones as a weapon of terrorism’, Public Interest Report, 67(2), pp. 1–5. Available at: https://fas.org/pir-pubs/hezbollah-use-drones-weapon-terrorism/ (Accessed: 3 May, 2023).
  • 21. Huang L. and Yang Q. (2015) GPS spoofing: Low-cost GPS simulator. Presented at DEF CON 23, Las Vegas, NV, USA. Available at: https://.researchgate.net/publication/286330869_Low-cost_GPS_simulator_-_GPS_spoofing_by_SDR (Accessed: 2 December 2022).
  • 22. Israel’s Homeland Security (iHLS) (2020) Would geo-fencing tech stop terrorist vehicle attacks? Available at: https://i-hls.com/archives/77355 (Accessed: 2 December 2022).
  • 23. Jafarnia-Jahromi A., Broumandan A., Nielsen J. and Lachapelle G. (2012) ‘GPS vulnerability to spoofing threats and a review of antispoofing techniques,’ International Journal of Navigation and Observation, 2012 (article ID 127072), pp. 1–16. doi: 10.1155/2012/127072.
  • 24. Kelley M.B. and Cenciotti D. (2012) ‘REPORT: Chinese experts could be in Iran right now collecting parts from the captured RQ-170 drone’, Business Insider, 17 August. Available at: .businessinsider.com/report-chinese-experts-to-inspect-and-collect-parts-of-drone-captured-in-iran-2012-8?r=US&IR=T (Accessed: 11 April 2023).
  • 25. Kerns A.J., Shepard D.P., Bhatti J.A. and Humphreys T.E. (2014) ‘Unmanned aircraft capture and control via GPS spoofing’, Journal of Field Robotics, 31(4), pp. 617–636. doi: 10.1002/rob.21513.
  • 26. Lee T.B. (2013) ‘Watch the pirate party fly a drone in front of Germany’s chancellor’, The Washington Post, 18 September. Available at: .washingtonpost.com/news/the-switch/wp/2013/09/18/watch-the-pirate-party-fly-a-drone-in-front-of-germanys-chancellor/ (Accessed: 2 December 2022).
  • 27. Link J. (2022) ‘Drone contraband deliveries are rampant at US prisons’, Wired, 29 July. Available at: .wired.co.uk/article/drone-contraband-deliveries-prisons-united-states (Accessed: 11 April 2023).
  • 28. Market Watch (2022) Global active geofencing market size 2022 industry share, growth, business challenges, investment opportunities, demand, key manufacturers and 2026 forecast research report. Available at: https://.marketwatch.com/press-release/active-geofencing-market---growth-insights-and-trends-development-by-regions-2020-key-driven-factors-cagr-status-with-revenue-covid-19-impact-on-industry-size-forecast-to-2026-2020-10-14 (Accessed: 2 December 2022).
  • 29. Ministry of Defence of the Russian Federation (2018) Head of the Russian General Staff’s office for UAV Development Major General Alexander Novikov holds briefing for domestic and foreign reporters. Available at: http://eng.mil.ru/en/news_page/country/more.htm?id=12157872@egNews (Accessed: 2 December 2022).
  • 30. Mu E. (2014) ‘China’s Qihoo hacks a Tesla model S’, Forbes Asia, 15 July. Available at: .forbes.com/sites/ericxlmu/2014/07/15/chinas-qihoo-hacks-a-tesla-model-s/#3e3cdaee3ead (Accessed: 11 April 2023).
  • 31. Posky M. (2019) ‘Hackers do the dirty to another Tesla model 3’, The Truth About Cars (TTAC), 28 June. Available at: .thetruthaboutcars.com/2019/06/hackers-do-the-dirty-to-another-tesla-model-3/ (Accessed: 11 April 2023).
  • 32. pzdupe1 (Pseudonym) (2016) ‘Hackers show how they tricked a Tesla into hitting objects in its path’, Business Insider India, 9 August. Available at: .businessinsider.com/defcon-tesla-jamming-spoofing-autopilot-2016-8?r=US&IR=T (Accessed: 11 April 2023).
  • 33. Regulus (2018) Defending against spoofing and jamming GPS. Available at: .regulus.com/blog/defending-against-spoofing-and-jamming-gps (Accessed: 11 April 2023).
  • 34. Regulus (2019) Tesla model 3 spoofed off the highway – Regulus navigation system hack causes car to turn on its own. Available at: .regulus.com/blog/tesla-model-3-spoofed-off-the-highway-regulus-navigation-system-hack-causes-car-to-turn-on-its-own. (Accessed: 2 December 2022).
  • 35. Rowlatt J. (2019) ‘Gatwick drone attack possible inside job, say police’, BBC News, 14 April. Available at: .bbc.co.uk/news/uk-47919680 (Accessed: 2 December 2022).
  • 36. Scharre P. (2015) ‘Counter-swarm: A guide to defeating robotic swarms’, War on the Rocks, 31 March. Available at: warontherocks.com/2015/03/counter-swarm-a-guide-to-defeating-robotic-swarms/ (Accessed: 2 December 2022).
  • 37. Stokel-Walker C. (2019) ‘Tesla’s autopilot tricked into driving on the wrong side of the road’, New Scientist, 1 April. Available at: .newscientist.com/article/2198325-teslas-autopilot-tricked-into-driving-on-the-wrong-side-of-the-road/ (Accessed: 2 December 2022).
  • 38. Sathyamoorthy D., Amin Z.F.M., Selamat E., Hassan S.A., Firdaus A., Kazmar A., and Zaimy Z. (2020) ‘Evaluation Of The Vulnerabilities Of Unmanned Aerial Vehicles (UAVS) to global positioning system (GPS) jamming and spoofing’, Defence S and T Technical Bulletin, November 2020. Science & Technology Research Institute for Defence (STRIDE), Ministry of Defence, Malaysia. Available via ResearchGate at: https://.researchgate.net/profile/Dinesh-Sathyamoorthy/publication/345150887_EVALUATION_OF_THE_VULNERABILITIES_OF_UNMANNED_AERIAL_VEHICLES_UAVS_TO_GLOBAL_POSITIONING_SYSTEM_GPS_JAMMING_AND_SPOOFING/links/5f9f5a6992851c14bcfc4172/EVALUATION-OF-THE-VULNERABILITIES-OF-UNMANNED-AERIAL-VEHICLES-UAVS-TO-GLOBAL-POSITIONING-SYSTEM-GPS-JAMMING-AND-SPOOFING.pdf (Accessed: 3 May 2023).
  • 39. Strategy Page (2019) Electronic weapons: Russia takes a victory lap. Available at: .strategypage.com/htmw/htecm/articles/20191103.aspx (Accessed: 2 December 2022).
  • 40. Soni B. (2022) ‘Norway’s ban on Russians flying drones faces test in court’, Financial Times, 28 November. Available at: .ft.com/content/1688a960-64a0-43ee-a3b4-243c5f1ccdfe (Accessed: 11 April 2023).
  • 41. Tucker T. (2015) ‘Chuck Schumer’s no-fly-zone rule for drones won’t work’, Defense One, 24 August. Available at: .defenseone.com/technology/2015/08/chuck-schumer-no-fly-zone-drones/119389/ (Accessed: 2 December 2022).
  • 42. United States Government Accountability Office (2012) ‘Unmanned aircraft systems: Measuring progress and addressing potential privacy concerns would facilitate integration into the national airspace system’, GAO-12-981, 14 September, pp. 1–45. Available at: https://.gao.gov/assets/gao-12-981.pdf (Accessed: 3 May 2023).
  • 43. VoA News (2020) Untitled media report, … The Saudi Defense system failed to spot our drones. Available at: .voanews.com/media/2394681/embed (Accessed: 2 December 2022).
  • 44. Warrick J. (2017) ‘Use of weaponized drones by ISIS spurs terrorism fears’, Washington Post, 21 February. Available at: https://.ausa.org/publications/role-drones-future-terrorist-attacks (Accessed: 2 December 2022).
  • 45. Watson K. (2018) ‘Venezuela President Maduro Survives drone assassination attempt’, BBC News, 5 August. Available at: https://.bbc.com/news/world-latin-america-45073385 (Accessed: 2 December 2022).
  • 46. Westbrook T. (2019) ‘The Global Positioning System and Military Jamming: The geographies of electronic warfare’, Journal of Strategic Security (JSS). 12(2), pp. 1–18. doi: 10.5038/1944-0472.12.2.1720.
  • 47. Westbrook T. (2023) ‘A Taxonomy of Radiofrequency Jamming and Spoofing Strategies and Criminal Motives’, Journal of Strategic Security (JSS). 16(1), pp. 1–14. In press.
  • 48. Whitlock C. and Gellman B. (2013) ‘US documents detail al-Qaeda’s efforts to fight back against drones’, The Washington Post, 3 September. Available at: .washingtonpost.com/world/national-security/us-documents-detail-al-qaedas-efforts-to-fight-back-against-drones/2013/09/03/b83e7654-11c0-11e3-b630-36617ca6640f_story.html (Accessed: 2 December 2022).
  • 49. Zangvil Y. (n.d.) Research on GPS resiliency & spoofing mitigation techniques across applications. Regulus, presentation slides accessible via: GPS.gov, “GPS: […] A global public service brought to you by the U.S. government.” Available at: https://.gps.gov/governance/advisory/meetings/2019-06/zangvil.pdf (Accessed: 2 December 2022).
  • 50. Zholobova M. (2019) Investigation into how the Russian leadership acquired unofficial residences. The Project Dacha partnership. Available at: .proekt.media/investigation/dacha-putina-gorki10/ (Accessed: 2 December 2022). Translated from Russian using Google Translate.
Uwagi
Opracowanie rekordu ze środków MEiN, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2022-2023).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-ccfeb769-2ce1-42df-9e6d-ef08cdf5e188
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.