A Taxonomy of Radiofrequency Jamming and Spoofing Strategies and Criminal Motives

Q2 Social Sciences
Tegg Westbrook
{"title":"A Taxonomy of Radiofrequency Jamming and Spoofing Strategies and Criminal Motives","authors":"Tegg Westbrook","doi":"10.5038/1944-0472.16.2.2081","DOIUrl":null,"url":null,"abstract":"This article provides a taxonomy of radiofrequency (RF) jamming and spoofing tactics and strategies associated with specific criminal objectives. This is based on the fact that the motivations and strategies of cyber-attackers – predominantly financial – is well-known, but the motivations behind specific electromagnetic interferences is lacking in the current literature. Previous research has also overlooked the motivations of other actors using jamming and spoofing devices.\nThe objective is to identify the most desirable spoofing and jamming strategies, likely targets, and likely motivations. The article finds that (a) previous literature on the subject overlooks a number of non-state actor motives, and therefore this research aims to fill this gap in knowledge; (b) out of 8 actors identified, denial of service attacks (7 out of 8), as well as so-called decoy spoofing (6), trojan spoofing (5), and jamming-enabled crime (5) are the most desirable strategies utilized; (c) out of 11 strategies identified, grey and black hat hackers (11 out of 11), terrorists (11) and activists (8), are likely to take advantage of most identified.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Strategic Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5038/1944-0472.16.2.2081","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 1

Abstract

This article provides a taxonomy of radiofrequency (RF) jamming and spoofing tactics and strategies associated with specific criminal objectives. This is based on the fact that the motivations and strategies of cyber-attackers – predominantly financial – is well-known, but the motivations behind specific electromagnetic interferences is lacking in the current literature. Previous research has also overlooked the motivations of other actors using jamming and spoofing devices. The objective is to identify the most desirable spoofing and jamming strategies, likely targets, and likely motivations. The article finds that (a) previous literature on the subject overlooks a number of non-state actor motives, and therefore this research aims to fill this gap in knowledge; (b) out of 8 actors identified, denial of service attacks (7 out of 8), as well as so-called decoy spoofing (6), trojan spoofing (5), and jamming-enabled crime (5) are the most desirable strategies utilized; (c) out of 11 strategies identified, grey and black hat hackers (11 out of 11), terrorists (11) and activists (8), are likely to take advantage of most identified.
射频干扰和欺骗策略与犯罪动机的分类
本文提供了与特定犯罪目标相关的射频干扰和欺骗策略的分类。这是基于这样一个事实,即网络攻击者(主要是金融攻击者)的动机和策略是众所周知的,但当前文献中缺乏特定电磁干扰背后的动机。先前的研究也忽略了其他参与者使用干扰和欺骗设备的动机。目标是确定最理想的欺骗和干扰策略、可能的目标和可能的动机。文章发现:(a)以前关于这一主题的文献忽略了一些非国家行为者的动机,因此本研究旨在填补这一知识空白;(b) 在确定的8个参与者中,拒绝服务攻击(8个中有7个)以及所谓的诱饵欺骗(6个)、特洛伊木马欺骗(5个)和干扰犯罪(5)是最理想的策略;(c) 在确定的11种策略中,灰帽和黑帽黑客(11种中有11种)、恐怖分子(11种)和活动家(8种)可能会利用大多数已确定的策略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Journal of Strategic Security
Journal of Strategic Security Social Sciences-Law
CiteScore
1.30
自引率
0.00%
发文量
26
审稿时长
12 weeks
期刊介绍: The Journal of Strategic Security (JSS) is a double-blind peer-reviewed professional journal published quarterly by Henley-Putnam School of Strategic Security with support from the University of South Florida Libraries. The Journal provides a multi-disciplinary forum for scholarship and discussion of strategic security issues drawing from the fields of global security, international relations, intelligence, terrorism and counterterrorism studies, among others. JSS is indexed in SCOPUS, the Directory of Open Access Journals, and several EBSCOhost and ProQuest databases.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信