How to deal with GPS jamming and spoofing | CRFS (2024)

Back to blog

Spectrum monitoring, Signal analysis / 3 min read

How to deal with GPS jamming and spoofing | CRFS (1)

Expanded and updated, July 2020

From ship navigation to financial transactions, we’re increasingly reliant on GPS (or other GNSS systems, such as Galileo, GLONASS or BDS BeiDou). Jamming and spoofing can therefore cause significant disruption and represent a public safety threat. Fortunately, spectrum monitoring allows detection and location of jammers and the possibility to pre-empt attacks with anti-jamming and anti-spoofing technologies.

GPS Jamming

Can GPS be jammed? Yes, and without much difficulty. GPS jamming is a relatively uncomplicated technique that simply involves producing an RF signal strong enough to drown out the transmissions from GPS satellites. The subject of a GPS jamming attack will be instantly aware that something is wrong, as the system will be unable to produce a geolocation result. GPS jamming can be carried out either unintentionally or deliberately, and its prevalence is increasing – during an L1 and L2 GPS band monitoring campaign over just a few weeks in London, we detected significant jamming activity. This ranged from crude unmodulated sources of interference poorly centered on the L1 or L2 band to synthesized sources suggesting deliberate targeting.

How to deal with GPS jamming and spoofing | CRFS (2)

A common use of jammers in London is taxi and HGV drivers evading rules on maximum driving hours or trying to stop employers from tracking them. In other parts of the world, GPS jamming has been used for more sinister purposes. South Korea was subject to a major campaign of GPS jamming from North Korea in 2016, affecting ship and aircraft navigation. And with the advent of 5G systems moving into the frequencies used by GPS, interference is likely to become more and more widespread.

Whatever the target of a GPS jammer, the devices do not discriminate, so there is usually additional collateral damage. Air Traffic Control (ATC), search and rescue operations, the electric grid and mobile phone services are all vulnerable to GPS jamming fallout. The London Stock Exchange has been subject to repeated GPS outages, affecting timestamping of financial transactions. In 2007, a navy exercise on loss of GPS communications in San Diego harbor meant that residents of the city were unable to withdraw cash from ATMs and doctors’ emergency pagers stopped working – it took 3 days to identify the ships as the cause. As jamming activity from civilian users becomes more prevalent, we risk similar disruptions as well as more fatal incidents such as aircraft colliding over populated areas.

Spectrum monitoring, as implemented in our London campaign, enables GPS jammers to be detected and located by mobile direction finding systems. Analysis of frequency spectra to determine duration of interference and signal type can also be used as an indication of whether the interference is accidental or deliberate. Those involved in unintentional jamming can then be warned and malicious attackers can be prosecuted. This results in quick resolution of disruption and danger caused by GPS jamming and acts as a preventative deterrent.

How to deal with GPS jamming and spoofing | CRFS (3)

CRFS’s RFeye receivers have exceptional noise performance allowing detection and location over larger areas. Automation features minimize human intervention and allow triggering of alarms on detection of jamming activity. Our GPS holdover module also ensures accurate timing synchronization between receivers even if jamming activity (or poor reception) means GPS signal is lost. High-performance receiver boards can also be integrated into 3rd party anti-jamming and anti-spoofing systems for critical applications requiring a proactive approach. Anti-jamming and anti-spoofing systems can distinguish true GPS signals from jammers and spoofers, enabling GPS location and timing services to continue even while under attack.

CRFS recommends that law enforcement implement a wider strategy of spectrum monitoring to combat the rise in GPS jamming activity. Any organisation highly dependent on GPS services, whether a stock exchange or Air Traffic Control, is also advised to operate a dedicated counter-jamming system to ensure continuous protection of critical infrastructure.

GPS Spoofing

GPS spoofing is a more insidious form of attack, which involves deliberately mimicking the form of transmissions from GPS satellites, tricking the receiver into believing that it has been sent information as expected. GPS spoofing in its simplest form (sometimes called denial-of-service spoofing) involves location information being sent to the GPS receiver which is clearly false (it might, for instance, tell a ship out at sea that it is currently located on land). It is immediately clear to the user that they are being spoofed, but it nonetheless stops them using their GPS system for its intended purpose. In these circ*mstances, spoofing basically functions as a more targeted form of jamming, that only affects GPS systems, rather than flooding the entire RF environment with noise.

An even more subtle and complex form of GPS spoofing, deception spoofing, involves hijacking GPS systems by initially sending them correct location information (so the spoofing is not immediately obvious), and then very slowly changing the information being sent so as to, for instance, drag vessels off course into hostile waters, or disable a vessel on a sand bank.

How to deal with GPS jamming and spoofing | CRFS (4)

So how does it work? GPS satellites send out a pseudo-random code, and receivers on the ground can tell from this code what time the signal was sent from each satellite. This allows them to determine how long the signal takes to reach them, and therefore how far from each satellite they are. The obvious way to determine if spoofing is taking place is to work out where the received signals are coming from. If it turns out to be sent from near to the receiver, rather than high in the atmosphere, we can be fairly certain the receiver is being spoofed. This is where CRFS’s systems come in. Using a network of at least four RFeye Nodes, a time difference of arrival (TDOA) calculation can be performed to find out where it originated. Not only does this allow the spoofing to be detected, but knowing the location of the spoofers can allow measures to be taken to shut it down at source.

Want to Know More?

If you’re being affected by GPS jamming or spoofing, and would like to discuss how CRFS systems can help, then get in touch with our technical team – we’d be more than happy to help.

CRFS Marketing
Previous article Next article

Related reading

Spectrum monitoring

Detecting interference and ensuring secure operations at quantum computer labs

By Jaimie Brzezinski / 23.05.2024

Read more

Spectrum monitoring

Why mobile operators may need RF sensing for inventory management

By Dean Bubley / 17.04.2024

Read more

How to deal with GPS jamming and spoofing | CRFS (2024)

FAQs

How can we mitigate GPS spoofing? ›

As a response to the increasing prevalence of GPS spoofing, various countermeasures are being developed to secure GPS-based systems, including signal strength monitoring, time-of-arrival analysis, and cryptographic authentication.

What are the immediate actions if jamming and spoofing is detected? ›

Actions if jamming and spoofing is detected Immediate actions: Manually select a secondary position sensor. Select other GNSS input if provided and use a “GNSS divergence” alarm to check any marginal difference between positioning sources.

How to fix GPS jamming? ›

One effective way to counter GPS jamming is to use Controlled Reception Pattern Antennas (CRPA) instead of standard GNSS antennas. CRPA are phased array antennas that shape their signal reception beams—minimizing the impact of jamming signals while optimizing the reception of GPS satellite signals.

What is the difference between GPS spoofing and GPS jamming? ›

Spoofing, on the other hand, entails the transmission of false GPS signals to deceive receivers, leading to incorrect time or coordinates readings. While jamming disrupts signals, spoofing can potentially mislead pilots and air traffic control systems, posing greater risks to aviation safety.

What are the mitigation strategies for spoofing? ›

Packet filtering can prevent an IP spoofing attack since it is able to filter out and block packets that contain conflicting source address information. Using cryptographic network protocols such as HTTP Secure (HTTPS) and Secure Shell (SSH) can add another layer of protection to your environment.

What stops spoofing? ›

Spoofed numbers can be blocked on an Android device the same way as any spam caller or unwanted contact. Open your Phone app on your home screen and find the Settings menu. Tap Block numbers. If your phone has caller ID and spam protection, enable this too.

What is the defense against spoofing? ›

To protect against spoofing attacks, businesses should use secure browsers and strong passwords. Secure browsers detect and prevent spoofed websites, keeping sensitive information safe. Strong, unique passwords with a mix of characters minimize this type of access.

What could happen if someone jammed or spoofed GPS? ›

GPS jamming overwhelms relatively weak GNSS signals, and in the U.S. and many other countries, it is against the law to compromise GNSS. Spoofing is not the same as jamming and is more sophisticated, tricking the receiver into calculating a false position, which could send an aircraft off the desired course.

How to counter jamming? ›

Polarization can be used to filter out unwanted signals, such as jamming. If a jammer and receiver do not have the same polarization, the jamming signal will incur a loss that reduces its effectiveness. The four basic polarizations are linear horizontal, linear vertical, right-hand circular, and left-hand circular.

What are anti-jamming techniques? ›

The anti-jamming system is implemented by projecting the received sequence onto the jammer-free subspace. This report focuses on the characteristics of the GPS C/A code and derives the signal to interference and noise ratio (SINR) of the GPS receivers implementing the subspace projection techniques.

Can GPS spoofing be detected? ›

There are several ways that fake GPS locations can be detected: Using multiple sources of location data: By cross-referencing location data from multiple sources, such as GPS, Wi-Fi, and cell tower triangulation, it can be easier to detect fake GPS locations.

Can a GPS jammer be detected? ›

Anti-jamming and anti-spoofing systems can distinguish true GPS signals from jammers and spoofers, enabling GPS location and timing services to continue even while under attack. CRFS recommends that law enforcement implement a wider strategy of spectrum monitoring to combat the rise in GPS jamming activity.

What is the problem with GPS spoofing? ›

GPS spoofing is an attack aimed at overriding a GPS-enabled device's original location. To do so, the attacker uses a radio transmitter that broadcasts fake GPS signals and interferes with GPS receivers nearby. As a result, those devices display fake GPS locations.

Which of the following are ways you can prevent being spoofed? ›

Check for any discrepancies or similarities with known addresses and confirm with the sender if you're uncertain. Avoid opening attachments from unknown or suspicious senders, as they may contain malware. Use two-factor authentication to add another layer of security against spoofing attacks on your devices.

What is the method we can use to avoid DNS spoofing? ›

To prevent DNS poisoning, you can use DNS spoofing detection, DNS security extensions, and end-to-end encryption. You can also not click on suspicious links, regularly scan your computer for malware, flush your DNS cache, and use a virtual private network (VPN).

Top Articles
Do RFID Wallets Ruin Credit Cards?
Extra-intestinal and long term consequences of Giardia duodenalis infections
NOAA: National Oceanic & Atmospheric Administration hiring NOAA Commissioned Officer: Inter-Service Transfer in Spokane Valley, WA | LinkedIn
Skyward Sinton
Ofw Pinoy Channel Su
Jeremy Corbell Twitter
Caroline Cps.powerschool.com
Erskine Plus Portal
Self-guided tour (for students) – Teaching & Learning Support
Nestle Paystub
83600 Block Of 11Th Street East Palmdale Ca
Taylor Swift Seating Chart Nashville
Craigslist Edmond Oklahoma
Rams vs. Lions highlights: Detroit defeats Los Angeles 26-20 in overtime thriller
Dumb Money, la recensione: Paul Dano e quel film biografico sul caso GameStop
Aldine Isd Pay Scale 23-24
Pay Boot Barn Credit Card
Apply for a credit card
Gina Wilson All Things Algebra Unit 2 Homework 8
Www.craigslist.com Savannah Ga
Teen Vogue Video Series
Governor Brown Signs Legislation Supporting California Legislative Women's Caucus Priorities
Weve Got You Surrounded Meme
Bellin Patient Portal
8000 Cranberry Springs Drive Suite 2M600
Crossword Help - Find Missing Letters & Solve Clues
Accuweather Minneapolis Radar
Strange World Showtimes Near Savoy 16
Bayard Martensen
Tracking every 2024 Trade Deadline deal
950 Sqft 2 BHK Villa for sale in Devi Redhills Sirinium | Red Hills, Chennai | Property ID - 15334774
My Dog Ate A 5Mg Flexeril
Brenda Song Wikifeet
Autopsy, Grave Rating, and Corpse Guide in Graveyard Keeper
Lehpiht Shop
24 slang words teens and Gen Zers are using in 2020, and what they really mean
Does Iherb Accept Ebt
Samsung 9C8
Restored Republic December 9 2022
Geology - Grand Canyon National Park (U.S. National Park Service)
Craigslist Gigs Wichita Ks
8 Ball Pool Unblocked Cool Math Games
Engr 2300 Osu
Top 1,000 Girl Names for Your Baby Girl in 2024 | Pampers
Tyco Forums
Ups Customer Center Locations
Premiumbukkake Tour
Strange World Showtimes Near Marcus La Crosse Cinema
R Detroit Lions
Turning Obsidian into My Perfect Writing App – The Sweet Setup
Philasd Zimbra
Latest Posts
Article information

Author: Aracelis Kilback

Last Updated:

Views: 5932

Rating: 4.3 / 5 (44 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Aracelis Kilback

Birthday: 1994-11-22

Address: Apt. 895 30151 Green Plain, Lake Mariela, RI 98141

Phone: +5992291857476

Job: Legal Officer

Hobby: LARPing, role-playing games, Slacklining, Reading, Inline skating, Brazilian jiu-jitsu, Dance

Introduction: My name is Aracelis Kilback, I am a nice, gentle, agreeable, joyous, attractive, combative, gifted person who loves writing and wants to share my knowledge and understanding with you.