<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1d1 20130915//EN" "JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">SDQ</journal-id><journal-title-group><journal-title>Security &amp; Defence Quarterly</journal-title><abbrev-journal-title>SDQ</abbrev-journal-title></journal-title-group><issn pub-type="epub">2544-994X</issn><issn pub-type="ppub">2300-8741</issn><publisher><publisher-name>Akademia Sztuki Wojennej</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">SDQ-42-00250</article-id><article-id pub-id-type="doi">10.35467/sdq/164760</article-id><article-categories><subj-group subj-group-type="heading"><subject>RESEARCH PAPER</subject></subj-group></article-categories><title-group><article-title>Trojan spoofing: A threat to critical infrastructure</article-title></title-group><contrib-group content-type="authors"><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-9889-3673</contrib-id><name><surname>Westbrook</surname><given-names>Tegg</given-names></name><email>tegg.westbrook@uis.no</email></contrib><aff id="aff1">Department of Safety, Economics, and Planning, University of Stavanger, Kjell Arholms Gate 41, 4021, Stavanger, Norway</aff></contrib-group><pub-date pub-type="epub"><day>21</day><month>05</month><year>2023</year></pub-date><volume>42</volume><issue>1</issue><fpage>1</fpage><lpage>15</lpage><history><date date-type="received"><day>02</day><month>12</month><year>2022</year></date><date date-type="rev-recd"><day>11</day><month>04</month><year>2023</year></date><date date-type="accepted"><day>27</day><month>04</month><year>2023</year></date></history><permissions><copyright-statement>© 2023 T. Westbrook published by War Studies University, Poland.</copyright-statement><copyright-year>2023</copyright-year><license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0"><license-p>This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (<ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/">http://creativecommons.org/licenses/by/4.0/</ext-link>).</license-p></license></permissions><abstract><p>This article explores the phenomenon of location spoofing—where the spoofer is able to “teleport” systems in and out of defined locations, either for the purpose of infiltration into no-go zones or for the “teleportation” out of real, defined zones in the physical world. The research relied on a qualitative methodology, utilising academic research findings, media reports, hacker demonstrations, and secondary data from these sources, to situate the spoofing threat in the context of international security. This conceptual, argumentative essay finds that signal spoofing, the methods of which can be followed via online scripts, allows users the ability to overcome geographically defined territorial restrictions. This, as this article finds, allows violent actors to weaponise systems, such as unmanned aerial systems, potentially leading to the escalation of political tensions in extreme but unfortunately ever-frequent episodes. The article concludes that, while Trojan spoofing (in particular) poses a real and an existential threat to international security, it is only a sum-of-all parts in considering other threats to critical functions in society. If geofences are used as a single point of security to protect assets against hostile actors, managers need to be aware of the vulnerability of intrusion and the resulting geopolitical consequences.</p></abstract><kwd-group><kwd>global positioning system</kwd><kwd>military deception</kwd><kwd>information warfare</kwd><kwd>unmanned aerial systems</kwd></kwd-group></article-meta></front><body><sec id="S1"><title>Introduction</title><p>Criminals and violent actors are increasingly finding ways to overcome the physical and digital security defences intended to limit their target choices. Increasingly, we see actors turning to the cyber domain to enable infiltration to obtain information and to enable physical access to secured locations. Whilst most cyber-enabled intrusions require a certain level of knowledge, sophistication, and motivation to carry out successfully, there are many seemingly “unsophisticated” ways in which cyber tools can complement physical crimes that are accessible, easy to use, and potentially damaging to societies.</p><p>Spoofing is one of many ways in which a criminal or, arguably worse, violent extremists, can expand their target choices for financial or political or ideological gains. Signal (Global Navigation Satellite System [GNSS]) spoofing is an attack using the electromagnetic spectrum to alter the time, trajectory, and/or positional data of the system with the intention to deceive the system, or a user of that system, to make a choice or action that might be favourable to the attacker.</p><p>From financial, aviation, maritime sectors, transportation, and energy infrastructures, many systems nowadays rely on precise positional and timing information from multiple orbiting satellites. The Global Positioning System (GPS) is one of a small number of satellite constellations, part of the GNSS, that provide free and accurate but insecure signals allowing civilian users, including businesses, critical infrastructures, and individual users, to enjoy its benefits. Beyond its military utility (the signals used with which are encrypted), it provides huge economic benefits, greater efficiency, and better use of resources in societies around the world.</p><p>Despite its vulnerability to manipulation, particularly from jamming, GNSS is used for a number of safety- and security-critical applications that are vulnerable to exploitation, some of which are wholly dependent on GNSS as well as others only partially aided by it. Whilst there are specific threats that might manifest as a result of time spoofing, the opportunities for malign actors to manipulate location or positional data are a concerning variable worthy of dedicated attention. What makes matters worse is that many online repositories, video demonstrations, step-by-step guides, and spoofing applications are available and accessible to anyone.</p><p>There has been an expanse of research dedicated to the weaponisation of autonomous and semi-autonomous systems by non-state actors and their cyber vulnerabilities (for example, <xref ref-type="bibr" rid="ref2">Almohammad and Speckhard, 2017</xref>; <xref ref-type="bibr" rid="ref6">Bhatti <italic>et al</italic>., 2012</xref>; <xref ref-type="bibr" rid="ref20">Hoenig, 2014</xref>; <xref ref-type="bibr" rid="ref21">Huang and Yang, 2015</xref>; <xref ref-type="bibr" rid="ref23">Jafarnia-Jahromi <italic>et al</italic>., 2012</xref>; <xref ref-type="bibr" rid="ref25">Kerns <italic>et al</italic>., 2014</xref>; <xref ref-type="bibr" rid="ref38">Sathyamoorthy <italic>et al</italic>., 2020</xref>; <xref ref-type="bibr" rid="ref47">Westbrook, 2023</xref>). Whilst many drone attacks have created serious causes for concern, cyberattacks <italic>against</italic> drones have been described as largely inconsequential geopolitically, beyond highlighting state and non-state actor cyber capability, and the consequences for that cyber manipulation, including eavesdropping, surveillance, and reverse engineering of secret military technology (<xref ref-type="bibr" rid="ref2">Almohammad and Speckhard, 2017</xref>). Most cyberattacks against surface vehicles have been undertaken by grey or black hat hackers, without intentionally targeting individuals, but instead for financial reward and revealing vulnerabilities for the common good (see, for example, <xref ref-type="bibr" rid="ref8">Bradbury, 2019</xref>; <xref ref-type="bibr" rid="ref17">Greenberg, 2016</xref>; Help Net Security, 2019; <xref ref-type="bibr" rid="ref30">Mu, 2014</xref>; <xref ref-type="bibr" rid="ref31">Posky, 2019</xref>; <xref ref-type="bibr" rid="ref32">pzdupe1 (Pseudonym), 2016</xref>; <xref ref-type="bibr" rid="ref33">Regulus, 2018</xref>, <xref ref-type="bibr" rid="ref34">2019</xref>; <xref ref-type="bibr" rid="ref37">Stokel-Walker, 2019</xref>).</p><p>There are very few examples of cyberattacks on drones that have led to military confrontations between adversaries (<xref ref-type="bibr" rid="ref2">Almohammad and Speckhard, 2017</xref>; <xref ref-type="bibr" rid="ref46">Westbrook, 2019</xref>). This is due to the fact that the impacts of cyberattacks have been seen as end in themselves, that is, online-to-online attacks; not as means-to-ends, that is, understood from the perspective of the physical manifestations—destruction of property to huge geopolitical consequences—that may result following the specific tactical manipulation of cyber-physical systems. Where this article fills a gap in knowledge is drawing attention to such physical manifestations and geopolitical consequences that might arise, particularly considering Iran, Russia, and America’s actions in recent years, and how Trojan spoofing, in particular, as a sum-of-parts in terms of many different threats, plays a part in this.</p></sec><sec id="S2"><title>Research question, methodology, and article structure</title><p>The primary research questions that this article seeks to answer are as follows: (1) To what extent can the identified spoofing strategies be used to endanger life and target critical infrastructure? and (2) what could be the consequences for international security?</p><p>Focussing on the vulnerabilities of systems and locations, the research involved an analysis of mostly academic research on spoofing as well as white/grey/black hat demonstrations, media reports, and secondary sources from these texts. The objective was to define specific spoofing tactics and strategies, with Trojan and Exposure spoofing being identified as two similar threats requiring further analysis and contextualisation (<xref ref-type="bibr" rid="ref47">Westbrook, 2023</xref>). The results are expressed by way of a review of real and hypothetical examples of where Trojan and Exposure spoofing have been used. The data were analysed from the perspective of identified vulnerabilities of GNSS-dependent or GNSS-reliant systems, and further hypothesising of the consequences in light of previous and contemporary geopolitical events.</p><p>The article is structured as follows: It situates the concept of military deception in the context of location spoofing, considering location “teleportation” as a useful analogy in considering the possibilities of an attacker infiltrating digital zones—namely geofences—for the purpose of illegal or lethal activity. In defining what geofences are, it explores its importance for security despite its susceptibility to location spoofing. Having identified the vulnerability of geofences, it then explores the concept of Trojan spoofing, identifying real and hypothetical scenarios within which Trojan spoofing has been used or at least considered to infiltrate geofenced zones. Thereafter, the concept of Exposure spoofing is explored, considering how, based on evidence, it could put people (rather than critical infrastructure) in danger. A discussion of the underlying foundations determining the threat picture is explored, with the Persian Gulf Crisis (2019–2021) and the Russian invasion of Ukraine (2022–) being considered examples of the utility of weaponising drones, and politically incendiary consequences for international security. In the conclusion, I argue that whilst Trojan and Exposure spoofing are concerning threats that can be followed using online scripts, it still requires a certain degree of sophistication, planning, and motivation to use effectively. It is still questionable whether they would be a replacement for other seemingly “easier” ways of attacking critical infrastructure.</p></sec><sec id="S3"><title>Military Deception</title><p>Distributed denial-of-service attacks, ransomware, and various means of deception and deceit are serious calamities for many different businesses and critical infrastructure managers from cyberattackers. Deception as a means of gaining access to information or misleading someone into taking an action that favours an attacker is one of the numerous problems encountered by many individuals, businesses, and critical sectors. As for military tactics, this is understood within the sphere of military deception, or information warfare, using communicative deception to protect ourselves and endanger others for our own absolute or relative gains. Here, digitisation and commercialisation of the radio spectrum blurs the lines between (dis-)information warfare, political violence, and criminality. There is now in society a fusion between classical military tactics and new and emerging cyber-criminal activity.</p><p>When it comes to GNSS spoofing, it is difficult to conceive how, aside from its ability to deny service to users by degrading their ability to use locational/positional data, it can be used beyond a measure to merely inconvenience, rather than threaten lives, livelihoods, and international order.</p><p>Teleportation (or time travel) sounds like something out of a science fiction book that contradicts the laws of physics. But there are forms of “teleportation” that does not mean the transfer of matter or energy, but rather the transfer of “information” that digitally makes physical matter “disappear” from its factual place of being. Compatible with the philosophy of “mind-body dualism,” the transfer of “conscious matter” whilst keeping the physical matter in its true location, or indeed deceiving digital systems to believe visible matter is <italic>not there</italic>, is comparable with this analogy. In engineering disciplines, this is often known as an “outlier.”</p><p>There is something “science fiction” about spoofing and the digital world we live in. The metaphor of teleportation (the instant transportation across space and distance) or time travel (the movement between different points in time) is not perfect, but the spoofing of GNSS timestamps affects the position and velocity information in a physical system, ultimately making locational information falsified. One source describes the deceptive tactics of the West African Rubber Frog as “a form of spoofing, or false data, attack.” The frog “secretes a pheromone that prevents the normally aggressive stinging ant <italic>paltothyreus tarsatus</italic> from attacking it. The frog then lives inside the ant colony during the dry season, reaping the benefits of the nest’s humidity and protection from prey” (<xref ref-type="bibr" rid="ref36">Scharre, 2015</xref>). The courageous “infiltration” of the West African Rubber Frog, the pheromone of which is representative of the falsified time-location information, is the closest analogy to what this research identifies, notably Trojan and Exposure spoofing, which I explain in detail in the following sections.</p><p>Achieving Trojan and Exposure spoofing, however, is more about infiltrating “invisible territories” than territories and boundaries that are physically, culturally, legally, or politically defined, like state borders. These visible, invisible, and “imagined” territories overlap, but it is the <italic>invisible</italic> ones that have not been fully explored from a security and safety perspective in academic scholarship. In order to explore this further, there is a need to explain precisely what geofences—as “invisible zones”—are, and how and why they might be evaded via spoofing.</p></sec><sec id="S4"><title>Geofences</title><p>Geofences use global navigation satellite signals or Radio Frequency Identification technology to create virtual geographic boundaries that regulate anything from altitude, speed, and access for unmanned aerial systems (UAS) and land-based systems like connected or semi-automated road vehicles and e-scooters. With the proliferation of smartphones and telematics, we see sectors, such as retail, logistics, automotive, marketing, gaming, and other industries using geofences.</p><p>Many businesses, like logistics companies and banks, use geofencing to track their assets for the purpose of monitoring their cargo entering and leaving designated areas, for example. Many other companies use geofences to gather big data for proximity marketing and use this data to interpret consumer behaviours. In the autonomous vehicle industries, geofences are already widely deployed to control and restrict access for UAS (near airports and power stations, for example). Likewise, controlling speed and access restrictions for e-scooter users swooshing around cities like Stockholm and Amsterdam would not be possible without geofencing. Some companies geofence their own fleets of hybrid vehicles by making them switch between fossil fuels (e.g. on highways) and cleaner fuels (e.g. in residential areas). Geofences are limited to the systems and frequencies that have been registered.</p><p>Geofencing has even been considered as a tool to protect high-risk areas from marauding terrorist attacks. Following a vehicle ramming attack in Stockholm in April 2017, during which a stolen van was used to mow down pedestrians on a busy shopping street, the Swedish government announced that it was exploring the introduction of geofence technology in urban areas in collaboration with vehicle manufacturers Scania and Volvo (<xref ref-type="bibr" rid="ref14">Government Office of Sweden, Ministry of Enterprise and Innovation, 2017</xref>). One idea behind the initiative is to create “no-drive” zones or enforce mandatory speed limits for vehicles accessing certain areas, thus limiting their opportunities to gather speed. Similarly, following vehicle attacks in Westminster (in March 2017), London Bridge, and Finsbury Park (both in June 2017) in the United Kingdom, research was carried out by the UK Department for Transport to determine whether devices can shut down vehicles when they have been hijacked (<xref ref-type="bibr" rid="ref22">Israel’s Homeland Security (iHLS), 2020</xref>). Similar to Swedish tests, the UK-based Trak Global Group was looking at how telematics, or black box-style devices, can be linked with driver ID mechanisms, such as a smartphone, “disabling the vehicle if the phone is not present” and alerting “emergency services in the event of a hijacking or vehicle theft” (iHLS, 2020).</p><p>Thus, the opportunities for creating invisible zones to control autonomous systems, including weaponised UAS, for security and safety purposes are numerous, and the industry for it is steadily increasing (<xref ref-type="bibr" rid="ref28">Market Watch, 2022</xref>). It is likely to accelerate further following the COVID-19 pandemic, which has highlighted the need for tracking and geolocation tools to limit the spread of infections and isolate those infected.</p><p>As for aerial systems, a drone flyer would be unable to fly in some geofenced zones (like airports or prisons) for obvious reasons. Altitude zones likewise restrict UAS to fly at heights that might endanger aircraft or infringe on people’s privacy, for example, preventing UAS from flying over gardens. Other “no-drone zones” or less-restrictive “some-drone zones” (for inspection work or emergency situations) might be placed near schools, over electricity pylons, highways, and so forth. Some geofences can be requested, or removed, by site managers and drone operators at request. Many geofences around critical infrastructure are not removable.</p><p>Perhaps due to the implementation of geofences (as well as their relatively low levels of consumption and use), the number of deaths and injury caused by UAS is extremely minor compared with land vehicles. But there are no open-source data to tell us whether geofencing has improved overall safety and security in high-risk areas. We can postulate, however, that without geofencing, a “free-for-all” anarchic airspace would likely lead to some serious and undesirable problems, and if UAS can be easily spoofed so that they can fly in restricted areas (Trojan spoofing), this is similarly worrying.</p></sec><sec id="S5"><title>Trojan Spoofing</title><p>Trojan spoofing allows manned or autonomous vehicles to enter restricted (geofenced) areas by making the autonomous system believe—based on false position information—it is in an unrestricted location, thus overcoming the <italic>real</italic> area restrictions.</p><p>Trojan spoofing is a tactic intended to trick a system (drone, car, or ship) to believe that it is somewhere else. Encroaching geofenced areas may not even require spoofing. The operator could make their own drone from scratch or remove the geofencing software (installed in most commercial unmanned aerial vehicles [UAVs]), or fly the UAS manually (albeit with some difficulty). “Insiders” with special access, for example, in airports, could also use UAS in “some-drone zones” without the usual restrictions to fly in hazardous areas, as might have been the case at Gatwick Airport, UK, in December 2018, leading to hundreds of cancelled flights (<xref ref-type="bibr" rid="ref35">Rowlatt, 2019</xref>). Recently, Russian nationals have been banned from using drones in Norway following several incidents in which drones were flown around critical infrastructure in the country (<xref ref-type="bibr" rid="ref40">Soni, 2022</xref>). The accusation of China using “spy balloons” over North America in 2023 also demonstrates the potential utility of aerial systems to surveil critical infrastructure.</p><p>There are numerous examples of hobbyists, activists, journalists, paparazzi, criminals, and violent organisations using UAS to enter “restricted zones”—zones that are defined in the legal, social, military, and political sense, but of which is not clear in the “invisible” sense (geofenced). The most serious examples being for reconnaissance and surveillance of nuclear facilities, smuggling contraband to prisoners, smuggling drugs over national borders, for propaganda purposes, or weaponising them with chemical, biological, radiological, and explosive materials (<xref ref-type="bibr" rid="ref13">G4S, 2020</xref>). There is thus high interest for utilising UAS for political, financial, and strategic reasons. Indeed, in 2019, an “investigative report by the Russian independent media group ‘The Project’ into luxury dachas owned by high-ranking government officials revealed that almost all included [signal] jammers among their amenities. Attempts by the journalists to photograph the dachas from the air using drones were routinely foiled by jamming” (<xref ref-type="bibr" rid="ref15">Goward, 2019</xref>; <xref ref-type="bibr" rid="ref50">Zholobova, 2019</xref>). Prisons around the world use geofencing and jamming to stop contraband being smuggled in via the use of UAS (<xref ref-type="bibr" rid="ref27">Link, 2022</xref>).</p><p>Whilst geofencing has made it more difficult for those with commercial UAS to enter restricted zones, it is still possible to do this easily and cheaply with spoofing equipment. In 2015, researchers from China’s Qihoo demonstrated “Trojan spoofing” by “using the free and open source GNU radio, amongst other tools, to alter the GPS coordinates on a DJI Phantom 3” (<xref ref-type="bibr" rid="ref7">Brewster, 2015</xref>). Researcher Qing Yang said that “any hackers wanting to land a DJI [a China-based manufacturer and distributor of UAS] or other drone on Obama’s lawn, or into other no-fly zones, can send spoof signals that would make it seem the UAV was in a safe zone” (<xref ref-type="bibr" rid="ref21">Huang and Yang, 2015</xref>). What was apparently concerning was that the researchers did not need physical access to the drone, and that the Phantom drone in question was of the upper-end of secure UAS for the period (<xref ref-type="bibr" rid="ref41">Tucker, 2015</xref>).</p><p>Similar tricks are shown by enthusiasts on social media and video-sharing platforms, and the methods are openly shared in hobbyist chat rooms and websites for people annoyed with what they deem to be arbitrary and excessive zoning of anywhere that appears remotely hazardous or asocial. A green open space miles away from an airport might be geofenced because it is at the edge of a possible alternative landing approach zone (which is never used other than in exceptional circumstances)—information of which is not readily apparent to the hobbyist.</p><p>More serious examples can be found when we look at possible cases of Trojan spoofing in conflict zones, where terrorists/insurgents/rebels have either utilised civilian UAS, made their own, or been assisted in some way by a sympathetic state actor. Indeed, major manufacturers and distributors of civilian zones, like DJI, geofence their UAS so that they disable them from being used by assailants in conflict zones like Iraq and Syria. This, however, has not eliminated the consistent surveillance and weaponisation of UAS. Indeed, UAS give terrorists—like their adversaries—the range the required to operate from great distances.</p><p>In January 2018, insurgents/terrorists attacked a Russian military base Khmeimim in Syria with 13 commerical, fixed-wing UAVs laden with “explosive fragmentation munitions” with pre-programmed [GNSS] flight path coordinates. The UAS were reportedly “all launched from the same location about 96 km away” (C4AS, 2019; <xref ref-type="bibr" rid="ref29">Ministry of Defence of the Russian Federation, 2018</xref>). The insurgents/terrorists either removed the geofencing software for their “homemade drones” and/or spoofed their locations. The “swarm attack” largely failed, however. The UAS were jammed, captured, or shot down, with no known casualties. The Khmeimim airbase, built by Russia in 2015 near the port city of Latakia, is 85 km north of Tartus and 50 km from the Turkish border. Reportedly, but unconfirmed, the insurgents/terrorists were based near the Turkish border (<xref ref-type="bibr" rid="ref39">Strategy Page, 2019</xref>).</p><p>It is disputable whether Houthi rebels or Iran attacked the Abqaiq–Khurais Saudi oil installations in 2019 this way, temporarily cutting Saudi Arabia’s oil production by half and creating a knock-on effect on global markets (and coincidentally, triggering the Persian Gulf Crisis, of which the British-flagged vessel <italic>Stena Impero</italic> might have been spoofed and captured by Iran [<xref ref-type="bibr" rid="ref4">BBC, 2019</xref>]). Indeed, after the attack, reportedly involving more or less a dozen UAS and missiles flying southwards from the direction of Iran, a Houthi leader boasted that they “built their drones in order to avoid [the Saudi defence system, and their] defense system failed to even spot our drones” (<xref ref-type="bibr" rid="ref43">VoV News, 2019</xref>). Senior officials from affected countries, including the United States (whose homemade defence system was bypassed), pointed the finger at Iran. There are many different reasons suggested as to why the defences—including missile defence systems—were overcome. One suggestion is that the UAS flew low enough to avoid detection. Trojan spoofing is only one of many possibilities. Iran has proven to be capable of spoofing military drones to enable capture or for the justification for armed confrontation without provoking armed responses. In two known cases of Iran spoofing US drones, on both occasions an armed response was considered at higher levels in the United States (<xref ref-type="bibr" rid="ref1">Adde, 2021</xref>; <xref ref-type="bibr" rid="ref24">Kelley and Cenciotti, 2012</xref>; <xref ref-type="bibr" rid="ref46">Westbrook, 2019</xref>).</p><p>What is worrying, though, is that such an attack can be easily replicated in geofenced areas with more accessible UAS without state assistance: targeting cities, sports stadiums, airports, and so forth. Indeed, Osama bin Laden allegedly considered attacking G8 Summit leaders in 2001 using UAS with explosives; another Al-Qaeda terrorist planned to attack the House of Commons with Anthrax (2002); Hamas and other groups have plotted and attempted to attack Israeli civilians with UAS; and the Islamic State, who have used commercial UAS at scale in Iraq and Syria (<xref ref-type="bibr" rid="ref44">Warrick, 2017</xref>), encouraged its supporters to attack the Rio Olympics in 2016 this way; ten plotters were arrested (<xref ref-type="bibr" rid="ref13">G4S, 2020</xref>).</p><p>Indeed, in 2010, in a classified report, the CIA noted “that al-Qaeda was placing special emphasis on the recruitment of technicians and that ‘the skills most in demand’ included expertise in drones and missile technology” (<xref ref-type="bibr" rid="ref48">Whitlock and Gellman, 2013</xref>). Whilst focusing more on evasion than overcoming virtual fences, the eagerness to recruit technicians and computer scientists shows the potential in finding ways to overcome drone defences. Abandoned Al-Qaeda documents has indicated that the Russian SkyGrabber software, Russian “Rascal” devices, and self-tuning Wave Bubble jamming and spoofing technologies, among others, have been suggested to be used to target aerial systems (<xref ref-type="bibr" rid="ref3">Associated Press, 2011</xref>).</p><p>For targeting individuals, current research shies away from proclaiming that groups will “take over” UAS and use them to target high-profile individuals. It is most likely that they would use their own UAS laden with lethal materials, fly them “old school” without GNSS guidance, and/or remove the geofence software. Assuming that geofencing might not be used, where the risks are disproportionate to the threat or location, or likely where interferences would affect too many bystanders, they could simply fly them with planned GNSS coordinates, and manually take charge at the point of need.</p><p>Indeed, in 1994, Aum Shinrikyo attempted but failed to attack a rival spiritual leader using a remote-controlled helicopter, which was designed to spray sarin gas (<xref ref-type="bibr" rid="ref9">Bunker, 2015</xref>). Unknown individuals were able to fly a drone with trace amounts of radiation on the roof of Japan’s former Prime Minister Shinzo Abe’s official residence in 2015. Activists from a rival political party were able to fly a drone within feet of Germany’s former Chancellor Angela Merkel at a campaign rally event in September 2013 (<xref ref-type="bibr" rid="ref26">Lee, 2013</xref>). In August 2018, two explosives-laded GNSS-guided UAS were used in a failed attempt to assassinate Venezuelan President Maduro during a military parade (<xref ref-type="bibr" rid="ref45">Watson, 2018</xref>). Seven people were reportedly injured. Madura blamed it on the “Venezuelan ultra-right in alliance with the Colombian ultra-right” (<xref ref-type="bibr" rid="ref11">Daniels, 2018</xref>). Russia blamed Ukraine for an ‘attempted assassination’ on Russian President Vladimir Putin using explosive-laden drones targeting the rigorously defended (including geofenced) Kremlin complex in May 2023 (<xref ref-type="bibr" rid="ref5">BBC News, 2023</xref>). The attack, however, has been described as staged by some commentators (<xref ref-type="bibr" rid="ref16">Gozzi, 2023</xref>).</p><p>These “successful” events are few among many foiled plots. In 2012, a man plotted to use a large remote-controlled model aircraft filled with plastic explosives to attack the Pentagon and Capitol Building (<xref ref-type="bibr" rid="ref42">United States Government Accountability Office, 2012</xref>, p. 30). It is thus clearly more favourable to manually fly—rather than “take over”—UAS to target high-profile individuals. In the present conflict in Ukraine, the deployment of “kamikaze” or “tactical drones” intended to crash into their targets (<xref ref-type="bibr" rid="ref18">Hambling, 2022</xref>), shows the fusion between military and insurgency thinking. The notorious US-made Switchblade is, for example, GNSS-guided.</p><p>Another worrying issue is intentionally spoofing a system—manned or unmanned—to expose people to certain dangers, rather than using spoofing to access restricted zones. The “dislocation” is where the concept Exposure spoofing comes into consideration.</p></sec><sec id="S6"><title>Exposure Spoofing</title><p>As many systems are dependent on geographical triggers like geofences, Exposure spoofing is something that is also worthy of attention. Exposure spoofing is intentionally exposing a victim to hazards by falsely positioning them in geographically defined areas that would trigger an automatic system to adjust itself to its (false) surroundings. Examples include making a motor vehicle automatically adjust to a higher suspension on a highway (as tests on older models of Tesla and Jeep models have shown) or, more seriously, making a commercial airplane adjust its wing dynamics too late off a runway (based on known instances of malfunctions). Referring to the former, tests on modern road vehicles have confirmed that this could be achieved, but the means-ends outcomes for today’s violent organisations are not obvious. It is more likely that Exposure spoofing will be used for “nonviolent” means, including unlocking doors to valuable cargo in faked zones (spoofing-enabled crime), as demonstrated by organised criminal gangs in South America. But this does not mean that “spoof-to-kill” intentions are eliminated. As mentioned, geofencing is a growing and versatile industry that is used for many applications, providing security, convenience, and efficiency for many users. There is a difference to be drawn between the act of spoofing to draw someone into a false sense of security (a form of deception) and spoofing that exploits automatic systems to adjust to a false location (Exposure spoofing).</p><p>Geofencing in some land vehicles is used for speed adaptation purposes. A vehicle using a mandatory intelligent speed adaptation system might use GNSS to regulate its speed between, say, a 30-mph road and 70-mph road. This presents a serious problem if we imagine that a system can be manipulated to believe that it is in the latter zone when actually it is in the former (or indeed the reverse.) Other onboard systems may also be manipulated to put the driver and passengers at risk. For example, systems, such as hands-free lane guidance, lane centring, or automatic lane changing, currently use cameras to detect road lines and other markings and, in 2019, researchers showed that it was possible to deceive these systems using fake road stickers (<xref ref-type="bibr" rid="ref37">Stokel-Walker, 2019</xref>). While GNSS spoofing has not been tested in this way, it is not difficult to imagine a scenario where road users are put at risk by a car made to believe that it is driving on the wrong side of the road.</p><p>For further context, the Israeli company Regulus undertook tests on a Tesla 3 vehicle in 2019, and revealed “a link between the car’s navigation and air suspension systems.” Their spoofing test demonstrated that height of the car could change “unexpectedly while moving because the suspension system ‘thought’ it was driving through various locations during the test, either on smooth roadways, when the car was lowered for greater aerodynamics, or ‘off-road’ streets, which would activate the car elevating its undercarriage to avoid any obstacles on the road” (<xref ref-type="bibr" rid="ref19">HelpNet Security, 2019</xref>). At face value, this does not appear to be too hazardous a situation (as Tesla stated in response, among other rebuttals [<xref ref-type="bibr" rid="ref19">HelpNet Security, 2019</xref>]), but if there are any other links between navigation systems and other systems there is reason to be concerned, according to Regulus. This includes the possibility of a vehicle failing to slow down before intersections, braking on main road thinking an intersection is close, to reporting a wrong SOS location in the event of accidents/collisions (<xref ref-type="bibr" rid="ref49">Zangvil, 2019</xref>). Given these examples, perhaps the proposed no-drive zones used for counterterrorism purposes by Swedish and UK authorities, could be overcome via GNSS spoofing. It really depends whether access/speed restrictions are dependent on GNSS or not.</p><p>On the other hand, whilst you can spoof the location of a drone to enter restricted geofenced zones (Trojan spoofing), you can do the reverse—to spoof to make a drone believe it is in a no-fly zone—as a denial of service (DoS) attack. The aforementioned Qihoo researchers demonstrated in a video how you can force a drone to crash land via “Exposure spoofing.” The researchers made the drone crash land when it reached the spoofed zone. Russia has consistently used spoofing as a form of DoS as an anti-drone measure for such purposes (<xref ref-type="bibr" rid="ref10">C4ADS, 2019</xref>).</p><p>Indeed, this kind of DoS spoofing can be used for defensive reasons. In and around the Kremlin in Russia, GNSS users—cab drivers, tourists, and the like—find that their digital maps show them at the nearest (geofenced) airport, and not strolling around the cobbled streets of Red Square. The spoofing used at the Kremlin complex is thought to be an anti-drone measure, but the illicit use of this method could be especially dangerous if people are underneath flying UAS, or if the UAS are directed into flight paths or instructed to land in hazardous areas (a motorway, for example).</p><p>Whilst Exposure spoofing can put those <italic>in</italic> (semi-)autonomous land vehicles and <italic>underneath</italic> UAVs in danger, what about other vehicles? Exposure spoofing can similarly be targeted at a vessel’s control systems and to trick the pilots and crew, or indeed the autopilot. Exposure spoofing could, for example, cause a ship to deviate from its desired trajectory and make the (auto)pilot believe it has plenty of clearance under the keel due to the spoofed location (<xref ref-type="bibr" rid="ref12">Farivar, 2013</xref>).</p><p>Whilst minor incidents daily occur in aerial and maritime industries, many of which are quickly resolved without any issue, a combination of other factors could increase the risks and hazards. Mild sickness, tiredness, boredom, inattention, inexperience, intoxication, the “map must be wrong” disbelief, and many other factors can make the issue worse. A combination of trickery and naivety, much like a pickpocketer’s magic show, could lead to serious consequences.</p></sec><sec id="S7"><title>A Threat to International Security?</title><p>The two primary research questions that this article sought to answer are as follows: (1) To what extent can the identified spoofing strategies be used to endanger life and target critical infrastructure? and (2) what might be the consequences for international security?</p><p>Although the present research was confined to a literature review of academic findings, media, and secondary sources, the concept of Trojan spoofing, in particular, should be taken seriously in light of the present and possible future conflicts. The threat of Trojan spoofing relies upon some underlying foundations determining the threat picture. Firstly, the more physical and hardened defences we have in place, the more actors will increasingly turn to the cyber domain to overcome such barriers. Using drones and cyberattacks lessens the risk of capture or killing of the attacker. Secondly, systems or assets dependent upon, or primarily aided by, GNSS are especially vulnerable to exploitation, and infrastructure managers using geofencing as a single source of security to control drones (or indeed any other aerial, land, or marine system), without additional detection, deterrence, and response controls, are neglecting this possibility and the range of potential “threat actors”—including hobbyists, activists, criminals, terrorists, or indeed rogue states. Thirdly, for purposes, such as hostile vehicle mitigation for surface vehicles, there are many other scenarios with which Trojan spoofing could apply. Fourthly, and importantly, the overriding assumption in contemporary literature is that the impact of cyberattacks, analysed as ends-in-themselves, not means-to-ends, leans on the side of an “inconvenience” measure of impact. This overlooks the potential cyber-physical manifestations resulting from the cyber event, and the intangible, often immeasurable, geopolitical consequences that might arise. Although the resulting consequences of Trojan and Exposure spoofing will probably cause inconvenience as well as financial impact, it could hypothetically do much worse.</p><p>Indeed, the consequences from the previous, mostly hypothetical, events are to an extent “measurable” based on the observable geopolitical impacts. The knock-on effects of the Persian Gulf Crisis, including the escalation, and actual military confrontation, notably between the United States and Iran during Donald Trump’s presidency, and the resulting increased militarisation in the Middle East, and threat of seizure and attacks against merchant shipping in the Gulf of Oman and Strait of Hormuz, show that one single event could exacerbate tensions in already precarious and globally vital regions. In light of Russia’s unprovoked invasion of Ukraine, and its activities surveilling, and possibly targeting, critical infrastructure in Europe, UAS provide the reach needed to get access to critical infrastructures.</p></sec><sec id="S8"><title>Conclusions</title><p>The world is increasingly being defined by invisible zones and digital leashes that distort the normative perceptions of location, territory, and (in)accessible space. Satellite navigation systems and those territorial cartographers of polygons—corporations, government institutions, and critical infrastructure managers—lay the laws of access in the invisible space for obvious safety and security reasons. That invisible space only becomes visible to those who look hard enough and want to overcome it. The examples in this article have focused on non-military GNSS-dependent and GNSS-aided systems that could be directly <italic>displaced</italic> by spoofing device, but also means by which this displacement enables encroachments into these invisible spaces via means-to-end spoofing. This, worryingly, means that “hardened” areas are not safe, particularly from a drone threat. Both Trojan and Exposure spoofing gives undesirable actors a plethora of—sometimes “near” and “easy”—target choices that might otherwise be unreachable without deploying cyber or electronic tools.</p><p>But the reality is that neither is equally attractive as a weapon of choice. The weaponisation of UAS is something that is significantly growing in both modern warfare and terrorist operations. Trojan spoofing UAS has the potential to do the dirty deeds of death and physical destruction on targets that have significant economic, political, iconic, and symbolic attractiveness, with the potential of creating crises (as the Persian Gulf crisis has highlighted) and inviting significant global media attention. Key individuals (such as political leaders), innocent bystanders, and critical infrastructure are at risk. But Trojan spoofing is only a sum-of-parts of the possibilities of weaponising drones; they will perhaps only be considered in exceptional circumstances where seemingly “easier” ways are discounted. Whilst the research findings of Qihoo’s research is 8 years old at the time of writing, the potential of exploitation still applies now, and will for the foreseeable future.</p><p>The examples of Exposure spoofing in this article, by comparison, are much more limited in terms of meeting certain political goals. Treated as an indiscriminate wide-area denial-of-service attack, and for aversion, it has potential utility. As a targeted attack against a person using a GNSS-aided system (such as a road vehicle), however, the media spectre of the threat supersedes the likelihood of it actually meeting violent group’s objectives and motives. The relative difficulty and need for favourable conditions means that “primitive” attacks against specific individuals might supersede the cyber approach. All told, the identification of the security flaw means that companies using GNSS for safety/security-critical systems, some of which have not been identified here, must consider even the possibility of accidental or natural interference that could put people at risk.</p></sec></body><back><sec id="S9" sec-type="financial-disclosure"><title>Funding</title><p>This research received no external funding.</p></sec><sec id="S10"><title>Data Availability Statement</title><p>Not applicable.</p></sec><sec id="S11" sec-type="COI-statement"><title>Disclosure statement</title><p>No potential conflict of interest was reported by the author. The author read and agreed to the published version of the manuscript.</p></sec><ref-list><ref id="ref1"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Adde</surname>, <given-names>N</given-names></string-name></person-group>. (<year>2021</year>) <article-title>‘Calls grow to find back up systems for GPS’</article-title>, <source><italic>National Defense</italic></source>, 11 February. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.nationaldefensemagazine.org/articles/2021/2/11/calls-grow-to-find-back-up-systems-for-gps">www.nationaldefensemagazine.org/articles/2021/2/11/calls-grow-to-find-back-up-systems-for-gps</ext-link> (Accessed: 11 April 2023).</mixed-citation></ref><ref id="ref2"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Almohammad</surname>, <given-names>A</given-names></string-name>. and <string-name><surname>Speckhard</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2017</year>) <article-title><italic>ISIS drones: evolution, leadership, bases, operations and logistics</italic></article-title>. <publisher-loc>United States</publisher-loc>: <publisher-name>International Centre for the Study of Violent Extremism</publisher-name>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.icsve.org/isis-drones-evolution-leadership-bases-operations-and-logistics/">www.icsve.org/isis-drones-evolution-leadership-bases-operations-and-logistics/</ext-link> (Accessed: 3 May, 2023).</mixed-citation></ref><ref id="ref3"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>Associated Press</collab></person-group> (<year>2011</year>) <chapter-title><italic>The Al-Qaida papers – Drones</italic></chapter-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://cryptome.org/2013/02/al-qaida-drones.pdf">https://cryptome.org/2013/02/al-qaida-drones.pdf</ext-link> (Accessed: 6 July 2022).</mixed-citation></ref><ref id="ref4"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>BBC News</collab></person-group> (<year>2019</year>) <article-title><italic>Saudi oil attacks: US blames Iran for drone strikes on two sites</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.bbc.co.uk/news/world-middle-east-49705197">www.bbc.co.uk/news/world-middle-east-49705197</ext-link> (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref5"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>BBC News</collab></person-group> (<year>2023</year>) <article-title><italic>Kremlin drone attack: Russia accuses Ukraine of trying to assassinate Putin</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.bbc.com/news/world-europe-65471904">https://www.bbc.com/news/world-europe-65471904</ext-link> (Accessed: 3 May 2023).</mixed-citation></ref><ref id="ref6"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bhatti</surname>, <given-names>J.A</given-names></string-name>., <string-name><surname>Shepard</surname>, <given-names>D.P</given-names></string-name>. and <string-name><surname>Humphreys</surname>, <given-names>T.E</given-names></string-name></person-group>. (<year>2012</year>) <article-title>‘Drone hack: spoofing attack demonstration on a civilian unmanned aerial vehicle’</article-title>, <source>GPS World</source>, <volume>23</volume>, pp. <fpage>30</fpage>–<lpage>33</lpage>. Available at: <ext-link ext-link-type="uri" xlink:href="https://radionavlab.ae.utexas.edu/images/stories/files/papers/drone_hack_shepard.pdf">https://radionavlab.ae.utexas.edu/images/stories/files/papers/drone_hack_shepard.pdf</ext-link> (Accessed: 3 May, 2023).</mixed-citation></ref><ref id="ref7"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Brewster</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2015</year>) <article-title>‘Watch GPS attacks that can kill DJI drones or bypass White House ban’</article-title>, <source><italic>Forbes</italic></source>, 8 August. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.forbes.com/sites/thomasbrewster/2015/08/08/qihoo-hacks-drone-gps/#7f6c16cf2bf5">www.forbes.com/sites/thomasbrewster/2015/08/08/qihoo-hacks-drone-gps/#7f6c16cf2bf5</ext-link> (Accessed: 3 May, 2023).</mixed-citation></ref><ref id="ref8"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Bradbury</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘Tesla 3 navigation system fooled with GPS spoofing’</article-title>, <source><italic>Naked Security</italic> (SOPHOS)</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://nakedsecurity.sophos.com/2019/06/27/researchers-fool-tesla-3-navigation-system-with-gps-spoofing/">https://nakedsecurity.sophos.com/2019/06/27/researchers-fool-tesla-3-navigation-system-with-gps-spoofing/</ext-link> (Accessed: 11 April 2023).</mixed-citation></ref><ref id="ref9"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Bunker</surname>, <given-names>R.J</given-names></string-name></person-group>. (<year>2015</year>, August) <article-title><italic>Terrorist and insurgent unmanned aerial vehicles: Use, potentials, and military implications</italic></article-title>. <publisher-loc>Carlisle, PA</publisher-loc>: <publisher-name>Strategic Studies Institute, US Army War College</publisher-name>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.ausa.org/publications/role-drones-future-terrorist-attacks">https://www.ausa.org/publications/role-drones-future-terrorist-attacks</ext-link> (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref10"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>C4ADS</collab></person-group> (<year>2019</year>) <article-title><italic>Above us only stars: Exposing GPS spoofing in Russia and Syria</italic></article-title>, pp. <fpage>1</fpage>–<lpage>66</lpage>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.c4reports.org/aboveusonlystars">https://www.c4reports.org/aboveusonlystars</ext-link> (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref11"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Daniels</surname>, <given-names>J.P</given-names></string-name></person-group>. (<year>2018</year>) <article-title>‘Venezuela’s Nicolás Maduro survives apparent assassination attempt’</article-title>, <source><italic>The Guardian</italic></source>, 5 August. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.theguardian.com/world/2018/aug/04/nicolas-maduros-speech-cut-short-while-soldiers-scatter">www.theguardian.com/world/2018/aug/04/nicolas-maduros-speech-cut-short-while-soldiers-scatter</ext-link> (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref12"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Farivar</surname>, <given-names>C</given-names></string-name></person-group>. (<year>2013</year>) <article-title>‘Professor fools $80M superyacht’s GPS receiver on the high seas’</article-title>, <source><italic>ArsTechnica</italic></source>, 30 July. Available at: <ext-link ext-link-type="uri" xlink:href="https://arstechnica.com/information-technology/2013/07/professor-spoofs-80m-superyachts-gps-receiver-on-the-high-seas/">arstechnica.com/information-technology/2013/07/professor-spoofs-80m-superyachts-gps-receiver-on-the-high-seas/</ext-link> (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref13"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>G4S</collab></person-group> (<year>2022</year>) <article-title><italic>Drones: Threat from above</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.g4s.com/en-ca/-/media/g4s/canada/files/whitepapers/usa/drones_threat_from_above.ashx?la=en&amp;hash=A5EE00E0402E0CB50FDA127500636B53">https://www.g4s.com/en-ca/-/media/g4s/canada/files/whitepapers/usa/drones_threat_from_above.ashx?la=en&amp;hash=A5EE00E0402E0CB50FDA127500636B53</ext-link> (Accessed: 16 October 2020).</mixed-citation></ref><ref id="ref14"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Government Office of Sweden, Ministry of Enterprise and Innovation</collab></person-group> (<year>2017</year>) <article-title><italic>Handshake on digitalisation and geofencing</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.government.se/articles/2017/05/handshake-on-digitalisation-and-geofencing/">www.government.se/articles/2017/05/handshake-on-digitalisation-and-geofencing/</ext-link> (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref15"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Goward</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘Jammers at dachas add to Russia’s ability to silence GPS’</article-title>, <source><italic>GPS World</italic></source>, 20 June. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.gpsworld.com/jammers-at-dachas-add-to-russias-ability-to-silence-gps/">www.gpsworld.com/jammers-at-dachas-add-to-russias-ability-to-silence-gps/</ext-link> (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref16"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Gozzi</surname>, <given-names>L</given-names></string-name></person-group>. (<year>2023</year>) <article-title>‘Ukraine war: Zelensky visits The Hague as fresh blasts rock Kyiv’</article-title>, <source>BBC News</source>, 4 May. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.bbc.com/news/world-europe-65478242">www.bbc.com/news/world-europe-65478242</ext-link> (Accessed: 4 May 2023).</mixed-citation></ref><ref id="ref17"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Greenberg</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2016</year>) <article-title>‘Hackers fool Tesla S’s autopilot to hide and spoof obstacles’</article-title>, <source><italic>Wired</italic></source>, 4 August. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.wired.com/2016/08/hackers-fool-tesla-ss-autopilot-hide-spoof-obstacles/">www.wired.com/2016/08/hackers-fool-tesla-ss-autopilot-hide-spoof-obstacles/</ext-link> (Accessed: 11 April 2023).</mixed-citation></ref><ref id="ref18"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Hambling</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2022</year>) <article-title>‘Ukrainian Kamikaze drone strike sets Russian oil facility ablaze (updated — Attack drone may have been made in China)’</article-title>, <source><italic>Forbes</italic></source>, 22 June. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.forbes.com/sites/davidhambling/2022/06/22/ukrainian-kamikaze-drone-strike-sets-russian-oil-facility-ablaze/?sh=768cea4b7a99">www.forbes.com/sites/davidhambling/2022/06/22/ukrainian-kamikaze-drone-strike-sets-russian-oil-facility-ablaze/?sh=768cea4b7a99</ext-link> (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref19"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>HelpNet</surname><given-names>Security</given-names></string-name></person-group> (<year>2019</year>) <article-title><italic>Research shows Tesla Model 3 and Model S are vulnerable to GPS spoofing attacks</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.helpnetsecurity.com/2019/06/19/tesla-gps-spoofing-attacks/">www.helpnetsecurity.com/2019/06/19/tesla-gps-spoofing-attacks/</ext-link> (Accessed: 3 May, 2023).</mixed-citation></ref><ref id="ref20"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hoenig</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2014</year>) <article-title>‘Hezbollah and the use of drones as a weapon of terrorism’</article-title>, <source>Public Interest Report</source>, <volume>67</volume>(<issue>2</issue>), pp. <fpage>1</fpage>–<lpage>5</lpage>. Available at: <ext-link ext-link-type="uri" xlink:href="https://fas.org/pir-pubs/hezbollah-use-drones-weapon-terrorism/">https://fas.org/pir-pubs/hezbollah-use-drones-weapon-terrorism/</ext-link> (Accessed: 3 May, 2023).</mixed-citation></ref><ref id="ref21"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Huang</surname>, <given-names>L</given-names></string-name>. and <string-name><surname>Yang</surname>, <given-names>Q</given-names></string-name></person-group>. (<year>2015</year>) <article-title><italic>GPS spoofing: Low-cost GPS simulator</italic></article-title>. <source>Presented at DEF CON 23</source>, <publisher-loc>Las Vegas, NV, USA</publisher-loc>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.researchgate.net/publication/286330869_Low-cost_GPS_simulator_-_GPS_spoofing_by_SDR">https://www.researchgate.net/publication/286330869_Low-cost_GPS_simulator_-_GPS_spoofing_by_SDR</ext-link> (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref22"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Israel’s Homeland Security (iHLS)</collab></person-group> (<year>2020</year>) <article-title><italic>Would geo-fencing tech stop terrorist vehicle attacks</italic></article-title>? Available at: <ext-link ext-link-type="uri" xlink:href="https://i-hls.com/archives/77355">https://i-hls.com/archives/77355</ext-link> (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref23"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Jafarnia-Jahromi</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Broumandan</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Nielsen</surname>, <given-names>J</given-names></string-name>. and <string-name><surname>Lachapelle</surname>, <given-names>G</given-names></string-name></person-group>. (<year>2012</year>) <article-title>‘GPS vulnerability to spoofing threats and a review of antispoofing techniques,’</article-title><source><italic>International Journal of Navigation and Observation</italic></source>, 2012 (article ID 127072), pp. <fpage>1</fpage>–<lpage>16</lpage>. doi: <pub-id pub-id-type="doi">10.1155/2012/127072</pub-id>.</mixed-citation></ref><ref id="ref24"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Kelley</surname>, <given-names>M.B</given-names></string-name>. and <string-name><surname>Cenciotti</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2012</year>) <article-title>‘REPORT: Chinese experts could be in Iran right now collecting parts from the captured RQ-170 drone’</article-title>, <source><italic>Business Insider</italic></source>, 17 August. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.businessinsider.com/report-chinese-experts-to-inspect-and-collect-parts-of-drone-captured-in-iran-2012-8?r=US&amp;IR=T">www.businessinsider.com/report-chinese-experts-to-inspect-and-collect-parts-of-drone-captured-in-iran-2012-8?r=US&amp;IR=T</ext-link> (Accessed: 11 April 2023).</mixed-citation></ref><ref id="ref25"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kerns</surname>, <given-names>A.J</given-names></string-name>., <string-name><surname>Shepard</surname>, <given-names>D.P</given-names></string-name>., <string-name><surname>Bhatti</surname>, <given-names>J.A</given-names></string-name>. and <string-name><surname>Humphreys</surname>. <given-names>T.E</given-names></string-name></person-group>. (<year>2014</year>) <article-title>‘Unmanned aircraft capture and control via GPS spoofing’</article-title>, <source>Journal of Field Robotics</source>, <volume>31</volume>(<issue>4</issue>), pp. <fpage>617</fpage>–<lpage>636</lpage>. doi: <pub-id pub-id-type="doi">10.1002/rob.21513</pub-id>.</mixed-citation></ref><ref id="ref26"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Lee</surname>, <given-names>T.B</given-names></string-name></person-group>. (<year>2013</year>) <article-title>‘Watch the pirate party fly a drone in front of Germany’s chancellor’</article-title>, <source><italic>The Washington Post</italic></source>, 18 September. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.washingtonpost.com/news/the-switch/wp/2013/09/18/watch-the-pirate-party-fly-a-drone-in-front-of-germanys-chancellor/">www.washingtonpost.com/news/the-switch/wp/2013/09/18/watch-the-pirate-party-fly-a-drone-in-front-of-germanys-chancellor/</ext-link> (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref27"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Link</surname>. <given-names>J</given-names></string-name></person-group>. (<year>2022</year>) <article-title>‘Drone contraband deliveries are rampant at US prisons’</article-title>, <source><italic>Wired</italic></source>, 29 July. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.wired.co.uk/article/drone-contraband-deliveries-prisons-united-states">www.wired.co.uk/article/drone-contraband-deliveries-prisons-united-states</ext-link> (Accessed: 11 April 2023).</mixed-citation></ref><ref id="ref28"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Market Watch</collab></person-group> (<year>2022</year>) <article-title><italic>Global active geofencing market size 2022 industry share, growth, business challenges, investment opportunities, demand, key manufacturers and 2026 forecast research report</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.marketwatch.com/press-release/active-geofencing-market---growth-insights-and-trends-development-by-regions-2020-key-driven-factors-cagr-status-with-revenue-covid-19-impact-on-industry-size-forecast-to-2026-2020-10-14">https://www.marketwatch.com/press-release/active-geofencing-market---growth-insights-and-trends-development-by-regions-2020-key-driven-factors-cagr-status-with-revenue-covid-19-impact-on-industry-size-forecast-to-2026-2020-10-14</ext-link> (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref29"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Ministry of Defence of the Russian Federation</collab></person-group> (<year>2018</year>) <article-title><italic>Head of the Russian General Staff’s office for UAV Development Major General Alexander Novikov holds briefing for domestic and foreign reporters</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="http://eng.mil.ru/en/news_page/country/more.htm?id=12157872@egNews">http://eng.mil.ru/en/news_page/country/more.htm?id=12157872@egNews</ext-link> (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref30"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Mu</surname>, <given-names>E</given-names></string-name></person-group>. (<year>2014</year>) <article-title>‘China’s Qihoo hacks a Tesla model S’</article-title>, <source><italic>Forbes Asia</italic></source>, 15 July. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.forbes.com/sites/ericxlmu/2014/07/15/chinas-qihoo-hacks-a-tesla-model-s/#3e3cdaee3ead">www.forbes.com/sites/ericxlmu/2014/07/15/chinas-qihoo-hacks-a-tesla-model-s/#3e3cdaee3ead</ext-link> (Accessed: 11 April 2023).</mixed-citation></ref><ref id="ref31"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Posky</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘Hackers do the dirty to another Tesla model 3’</article-title>, <source><italic>The Truth About Cars</italic> (<italic>TTAC</italic>)</source>, 28 June. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.thetruthaboutcars.com/2019/06/hackers-do-the-dirty-to-another-tesla-model-3/">www.thetruthaboutcars.com/2019/06/hackers-do-the-dirty-to-another-tesla-model-3/</ext-link> (Accessed: 11 April 2023).</mixed-citation></ref><ref id="ref32"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>pzdupe1 (Pseudonym)</collab></person-group> (<year>2016</year>) <article-title>‘Hackers show how they tricked a Tesla into hitting objects in its path’</article-title>, <source><italic>Business Insider India</italic></source>, 9 August. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.businessinsider.com/defcon-tesla-jamming-spoofing-autopilot-2016-8?r=US&amp;IR=T">www.businessinsider.com/defcon-tesla-jamming-spoofing-autopilot-2016-8?r=US&amp;IR=T</ext-link> (Accessed: 11 April 2023).</mixed-citation></ref><ref id="ref33"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Regulus</surname></string-name></person-group> (<year>2018</year>) <article-title><italic>Defending against spoofing and jamming GPS</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.regulus.com/blog/defending-against-spoofing-and-jamming-gps">www.regulus.com/blog/defending-against-spoofing-and-jamming-gps</ext-link> (Accessed: 11 April 2023).</mixed-citation></ref><ref id="ref34"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Regulus</surname></string-name></person-group> (<year>2019</year>) <article-title><italic>Tesla model 3 spoofed off the highway – Regulus navigation system hack causes car to turn on its own</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.regulus.com/blog/tesla-model-3-spoofed-off-the-highway-regulus-navigation-system-hack-causes-car-to-turn-on-its-own">www.regulus.com/blog/tesla-model-3-spoofed-off-the-highway-regulus-navigation-system-hack-causes-car-to-turn-on-its-own</ext-link>. (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref35"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Rowlatt</surname>, <given-names>J</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘Gatwick drone attack possible inside job, say police’</article-title>, <source><italic>BBC News</italic></source>, 14 April. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.bbc.co.uk/news/uk-47919680">www.bbc.co.uk/news/uk-47919680</ext-link> (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref36"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Scharre</surname>, <given-names>P</given-names></string-name></person-group>. (<year>2015</year>) <article-title>‘Counter-swarm: A guide to defeating robotic swarms’</article-title>, <source><italic>War on the Rocks</italic></source>, 31 March. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.warontherocks.com/2015/03/counter-swarm-a-guide-to-defeating-robotic-swarms/">warontherocks.com/2015/03/counter-swarm-a-guide-to-defeating-robotic-swarms/</ext-link> (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref37"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Stokel-Walker</surname>, <given-names>C</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘Tesla’s autopilot tricked into driving on the wrong side of the road’</article-title>, <source><italic>New Scientist</italic></source>, 1 April. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.newscientist.com/article/2198325-teslas-autopilot-tricked-into-driving-on-the-wrong-side-of-the-road/">www.newscientist.com/article/2198325-teslas-autopilot-tricked-into-driving-on-the-wrong-side-of-the-road/</ext-link> (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref38"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Sathyamoorthy</surname>, <given-names>D</given-names></string-name>., <string-name><surname>Amin</surname>, <given-names>Z.F.M</given-names></string-name>., <string-name><surname>Selamat</surname>, <given-names>E</given-names></string-name>., <string-name><surname>Hassan</surname>, <given-names>S.A</given-names></string-name>., <string-name><surname>Firdaus</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Kazmar</surname>, <given-names>A</given-names></string-name>., and <string-name><surname>Zaimy</surname>, <given-names>Z</given-names></string-name></person-group>. (<year>2020</year>) <article-title>‘Evaluation Of The Vulnerabilities Of Unmanned Aerial Vehicles (UAVS) to global positioning system (GPS) jamming and spoofing’</article-title>, <source><italic>Defence S and T Technical Bulletin</italic>, November 2020. Science &amp; Technology Research Institute for Defence (STRIDE), Ministry of Defence, Malaysia</source>. Available via ResearchGate at: <ext-link ext-link-type="uri" xlink:href="https://www.researchgate.net/profile/Dinesh-Sathyamoorthy/publication/345150887_EVALUATION_OF_THE_VULNERABILITIES_OF_UNMANNED_AERIAL_VEHICLES_UAVS_TO_GLOBAL_POSITIONING_SYSTEM_GPS_JAMMING_AND_SPOOFING/links/5f9f5a6992851c14bcfc4172/EVALUATION-OF-THE-VULNERABILITIES-OF-UNMANNED-AERIAL-VEHICLES-UAVS-TO-GLOBAL-POSITIONING-SYSTEM-GPS-JAMMING-AND-SPOOFING.pdf">https://www.researchgate.net/profile/Dinesh-Sathyamoorthy/publication/345150887_EVALUATION_OF_THE_VULNERABILITIES_OF_UNMANNED_AERIAL_VEHICLES_UAVS_TO_GLOBAL_POSITIONING_SYSTEM_GPS_JAMMING_AND_SPOOFING/links/5f9f5a6992851c14bcfc4172/EVALUATION-OF-THE-VULNERABILITIES-OF-UNMANNED-AERIAL-VEHICLES-UAVS-TO-GLOBAL-POSITIONING-SYSTEM-GPS-JAMMING-AND-SPOOFING.pdf</ext-link> (Accessed: 3 May 2023).</mixed-citation></ref><ref id="ref39"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Strategy Page</collab></person-group> (<year>2019</year>) <article-title><italic>Electronic weapons: Russia takes a victory lap</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.strategypage.com/htmw/htecm/articles/20191103.aspx">www.strategypage.com/htmw/htecm/articles/20191103.aspx</ext-link> (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref40"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Soni</surname>, <given-names>B</given-names></string-name></person-group>. (<year>2022</year>) <article-title>‘<italic>Norway’s ban on Russians flying drones faces test in court</italic>’</article-title>, <source><italic>Financial Times</italic></source>, 28 November. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.ft.com/content/1688a960-64a0-43ee-a3b4-243c5f1ccdfe">www.ft.com/content/1688a960-64a0-43ee-a3b4-243c5f1ccdfe</ext-link> (Accessed: 11 April 2023).</mixed-citation></ref><ref id="ref41"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Tucker</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2015</year>) <article-title>‘Chuck Schumer’s no-fly-zone rule for drones won’t work’</article-title>, <source><italic>Defense One</italic></source>, 24 August. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.defenseone.com/technology/2015/08/chuck-schumer-no-fly-zone-drones/119389/">www.defenseone.com/technology/2015/08/chuck-schumer-no-fly-zone-drones/119389/</ext-link> (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref42"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>United States Government Accountability Office</collab></person-group> (<year>2012</year>) <article-title>‘Unmanned aircraft systems: Measuring progress and addressing potential privacy concerns would facilitate integration into the national airspace system’</article-title>, <source>GAO-12-981</source>, 14 September, pp. <fpage>1</fpage>–<lpage>45</lpage>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.gao.gov/assets/gao-12-981.pdf">https://www.gao.gov/assets/gao-12-981.pdf</ext-link> (Accessed: 3 May 2023).</mixed-citation></ref><ref id="ref43"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>VoA</surname><given-names>News</given-names></string-name></person-group> (<year>2020</year>) <article-title>Untitled media report</article-title>, …<source><italic>The Saudi Defense system failed to spot our drones</italic></source>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.voanews.com/media/2394681/embed">www.voanews.com/media/2394681/embed</ext-link> (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref44"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Warrick</surname>, <given-names>J</given-names></string-name></person-group>. (<year>2017</year>) <article-title>‘Use of weaponized drones by ISIS spurs terrorism fears’</article-title>, <source><italic>Washington Post</italic></source>, 21 February. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.ausa.org/publications/role-drones-future-terrorist-attacks">https://www.ausa.org/publications/role-drones-future-terrorist-attacks</ext-link> (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref45"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Watson</surname>, <given-names>K</given-names></string-name></person-group>. (<year>2018</year>) <article-title>‘Venezuela President Maduro Survives drone assassination attempt’</article-title>, <source><italic>BBC News</italic></source>, 5 August. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.bbc.com/news/world-latin-america-45073385">https://www.bbc.com/news/world-latin-america-45073385</ext-link> (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref46"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Westbrook</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘The Global Positioning System and Military Jamming: The geographies of electronic warfare’</article-title>, <source>Journal of Strategic Security (JSS)</source>. <volume>12</volume>(<issue>2</issue>), pp. <fpage>1</fpage>–<lpage>18</lpage>. doi: <pub-id pub-id-type="doi">10.5038/1944-0472.12.2.1720</pub-id>.</mixed-citation></ref><ref id="ref47"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Westbrook</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2023</year>) <article-title>‘A Taxonomy of Radiofrequency Jamming and Spoofing Strategies and Criminal Motives’</article-title>, <source>Journal of Strategic Security (JSS)</source>. <volume>16</volume>(<issue>1</issue>), pp. <fpage>1</fpage>–<lpage>14</lpage>. In press.</mixed-citation></ref><ref id="ref48"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Whitlock</surname>, <given-names>C</given-names></string-name>. and <string-name><surname>Gellman</surname>, <given-names>B</given-names></string-name></person-group>. (<year>2013</year>) <article-title>‘US documents detail al-Qaeda’s efforts to fight back against drones’</article-title>, <source><italic>The Washington Post</italic></source>, 3 September. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.washingtonpost.com/world/national-security/us-documents-detail-al-qaedas-efforts-to-fight-back-against-drones/2013/09/03/b83e7654-11c0-11e3-b630-36617ca6640f_story.html">www.washingtonpost.com/world/national-security/us-documents-detail-al-qaedas-efforts-to-fight-back-against-drones/2013/09/03/b83e7654-11c0-11e3-b630-36617ca6640f_story.html</ext-link> (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref49"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Zangvil</surname>, <given-names>Y</given-names></string-name></person-group>. (n.d.) <article-title>Research on GPS resiliency &amp; spoofing mitigation techniques across applications</article-title>. <source>Regulus, presentation slides accessible via: GPS.gov, “GPS: […] A global public service brought to you by the U.S. government.”</source> Available at: <ext-link ext-link-type="uri" xlink:href="https://www.gps.gov/governance/advisory/meetings/2019-06/zangvil.pdf">https://www.gps.gov/governance/advisory/meetings/2019-06/zangvil.pdf</ext-link> (Accessed: 2 December 2022).</mixed-citation></ref><ref id="ref50"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Zholobova</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2019</year>) <article-title><italic>Investigation into how the Russian leadership acquired unofficial residences</italic></article-title>. <source>The Project Dacha partnership</source>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.proekt.media/investigation/dacha-putina-gorki10/">www.proekt.media/investigation/dacha-putina-gorki10/</ext-link> (Accessed: 2 December 2022). Translated from Russian using Google Translate.</mixed-citation></ref></ref-list></back></article>
