spoofing = Täuschung, Verschleierung, Manipulation; Angriffstechnik, bei der Cyberkriminelle in Computer oder Netzwerke eindringen, indem sie eine vertrauenswürdige Identität vortäuschen
This article delineates all aspects of SPOOFING from both an economic and legal perspective by providing a comprehensive overview of spoofing types, legislation, literature, rulings, and a conceptual framework of SPOOFING dimensions and attributes
Marjolein E. Verhulst , et al. — Capital Markets Law Journal (18th September 2025)
spoofing
noun
- a tactic in which a cyber criminal disguises malicious communication or activity as something from a trusted source
- criminal, digital impersonation—ranging from email and caller‑ID scams to sophisticated cyberattacks
NIST Computer Security Resource, Merriam-Webster
—
WORD ORIGIN
Spoofing comes from the English verb to spoof, meaning to hoax, parody, or trick by imitation. The word spoof is relatively young. It was popularized in the 1880s by the British comedian Arthur Roberts, who invented a comic card-and-dice game called Spoof. In the game, players tried to deceive one another through bluffing and false appearances—exactly the behaviour the word later came to describe.
From this playful origin, spoof quickly escaped the game table and entered everyday English as a term for a trick, hoax, or parody, especially one that relies on imitation. By the early 20th century it was used for theatrical and literary parody; by the late 20th century it was adopted by computing and security fields to describe technical impersonation (e.g., email spoofing, IP spoofing, caller-ID spoofing).
So while modern spoofing sounds high-tech and sinister, the word itself began as a joke about clever deception through pretending—and never entirely lost that flavour.
—
WHEN FAMILIAR BECOMES FAKE
Spoofing is the art of appearing legitimate while quietly undermining trust. In a digital world built on signals—names, numbers, faces, voices—spoofing exploits our instinct to believe what looks right. A familiar bank logo, a CEO’s writing style, even a colleague’s voice can be convincingly faked. Recent examples include caller-ID spoofing used in phone scams and AI-generated emails that mimic executives to authorize fraudulent payments.
The danger isn’t just technical; it’s psychological. Spoofing succeeds because it bypasses skepticism and triggers compliance, urgency, or politeness. The antidote is not paranoia, but disciplined verification. Slow down. Confirm requests through secondary channels. Use authentication tools, domain checks, call-back policies, and AI-aware training that teaches people how deception now sounds and looks.
Helga & Paul Smith
—
SYNONYMS
aping, bamboozling, baiting the hook, bluffing, conning, covering in a clown suit, cyber-identity (-masquerading), decoying, deception, disguise, dressing up in borrowed clothes, fabrication, fake front, fake-out, faking it, floating a phantom, forgery, fronting, hoax, hoaxing, impersonation, impostor act, masquerade, masquerading, masking, mimicry, mouse-trapping, play-acting, playing a shell game, pretence, pulling a fast one (the wool over someone’s eyes), put-on, putting on a false face, ruse, running a confidence game, sand in the eyes, sham (show), scam, sleight of hand, smoke and mirrors, spoof, SPOOFING, swindle, takeoff, taking for a ride, trickery, wile, wolf in sheep’s clothing
—
SMUGGLE
OWAD into a conversation today, say something like:
“Our staff training now includes recognizing SPOOFING attempts in routine requests.”
—
P L E A S E S U P P O R T O W A D
On evenings and weekends, I research and write your daily OWAD newsletter together with Helga—my lovely wife and coaching partner—and our eagle-eyed daughter, Jennifer.
It remains FREE, AD-FREE, and ALIVE thanks to voluntary donations from appreciative readers.
If you aren’t already, please consider supporting us — even a small donation, equivalent to just 1-cup-of-coffee a month, would help us in covering expenses for mailing, site-hosting, maintenance, and service.
Just head over to DonorBox:
Please help keep OWAD alive
or
Bank transfer to:
Paul Smith
IBAN: DE75 7316 0000 0002 5477 40
Important: please state as ’Verwendungszweck’: “OWAD donation” and the email address used to subscribe to OWAD.
Thanks so much,
Paul, Helga, & Jenny Smith
---------------------------------------------------------------------------------------
- Feedback, questions, new word suggestions to: paul@smith.de
- OWAD homepage, word archive, FAQs, publications, events, and more: www.owad.de