This has been an area of interest to the US Air Force for many years:

http://www.ainonline.com/aviation-news/aviation-international-news/2006-10-18/usaf-facility-tests-gps-jamming-vulnerability

--
Bill Byrom N5BB

On Mon, Aug 14, 2017, at 12:46 AM, Clint Jay wrote:
> Didn't someone demonstrate this using some rather expensive but 'off the
> shelf' Rohde & Schwarz lab gear a year or so ago?
> 
> 
> 
> On 12 August 2017 at 22:23, John Allen <j...@pcsupportsolutions.com>
> wrote:
> 
> > FYI, John K1AE
> >
> > -----Original Message-----
> > From: YCCC [mailto:yccc-boun...@contesting.com] On Behalf Of ROBERT
> > DOHERTY
> > Sent: Saturday, August 12, 2017 9:26 AM
> > To: YCCC Reflector
> > Subject: [YCCC] Fwd: Re: [Radio Officers, &c] Ships fooled in GPS spoofing
> > attack suggest Russian cyberweapon
> >
> > As if there were not enough problems in the world .....
> >
> > Whitey  K1VV
> >
> > >     Date: August 12, 2017 at 7:37 AM
> > >     Subject: Re: [Radio Officers, &c] Ships fooled in GPS spoofing
> > attack suggest Russian cyberweapon
> > >
> > >     Ships fooled in GPS spoofing attack suggest Russian cyberweapon
> > >
> > >     News from: New Scientis (article reported by R/O Luca Milone –
> > IZ7GEG)
> > >
> > >     https://www.newscientist.com/article/2143499-ships-fooled-
> > in-gps-spoofing-attack-suggest-russian-cyberweapon/#.
> > WY6zNfZq1VA.google_plusone_share https://www.newscientist.com/
> > article/2143499-ships-fooled-in-gps-spoofing-attack-
> > suggest-russian-cyberweapon/#.WY6zNfZq1VA.google_plusone_share
> > >
> > >
> > >     On date: 10 August 2017
> > >
> > >     By David Hambling
> > >
> > >
> > >     Reports of satellite navigation problems in the Black Sea suggest
> > that Russia may be testing a new system for spoofing GPS, New Scientist has
> > learned. This could be the first hint of a new form of electronic warfare
> > available to everyone from rogue nation states to petty criminals.
> > >
> > >
> > >     On 22 June, the US Maritime Administration filed a seemingly bland
> > incident report. The master of a ship off the Russian port of Novorossiysk
> > had discovered his GPS put him in the wrong spot – more than 32 kilometres
> > inland, at Gelendzhik Airport.
> > >
> > >
> > >     After checking the navigation equipment was working properly, the
> > captain contacted other nearby ships. Their AIS traces – signals from the
> > automatic identification system used to track vessels – placed them all at
> > the same airport. At least 20 ships were affected
> > http://maritime-executive.com/editorials/mass-gps-spoofing-
> > attack-in-black-sea .
> > >
> > >
> > >     While the incident is not yet confirmed, experts think this is the
> > first documented use of GPS misdirection – https://www.marad.dot.gov/
> > msci/alert/2017/2017-005a-gps-interference-black-sea/  a spoofing attack
> > that has long been warned of but never been seen in the wild.
> > >
> > >
> > >     Until now, the biggest worry for GPS has been it can be jammed
> > https://www.newscientist.com/article/dn20202-gps-chaos-how-
> > a-30-box-can-jam-your-life/  by masking the GPS satellite signal with
> > noise. While this can cause chaos, it is also easy to detect. GPS receivers
> > sound an alarm when they lose the signal due to jamming. Spoofing is more
> > insidious: a false signal from a ground station simply confuses a satellite
> > receiver. “Jamming just causes the receiver to die, spoofing causes the
> > receiver to lie,” says consultant David Last
> > http://www.professordavidlast.co.uk/ , former president of the UK’s Royal
> > Institute of Navigation.
> > >
> > >
> > >     Todd Humphreys http://www.ae.utexas.edu/faculty/faculty-directory/
> > humphreys , of the University of Texas at Austin, has been warning of the
> > coming danger of GPS spoofing for many years. In 2013, he showed how a
> > superyacht with state-of-the-art navigation could be lured off-course by
> > GPS spoofing. “The receiver’s behaviour in the Black Sea incident was much
> > like during the controlled attacks http://onlinelibrary.wiley.
> > com/doi/10.1002/navi.183/full  my team conducted,” says Humphreys.
> > >
> > >
> > >     Humphreys thinks this is Russia experimenting with a new form of
> > electronic warfare. Over the past year, GPS spoofing has been causing chaos
> > for the receivers on phone apps in central Moscow to misbehave
> > https://themoscowtimes.com/articles/the-kremlin-eats-gps-
> > for-breakfast-55823 . The scale of the problem did not become apparent
> > until people began trying to play Pokemon Go. The fake signal, which seems
> > to centre on the Kremlin, relocates anyone nearby to Vnukovo Airport
> > http://www.thetruthaboutcars.com/2017/01/bizarre-gps-
> > spoofing-means-drivers-near-kremlin-always-airport/ , 32 km away. This is
> > probably for defensive reasons; many NATO guided bombs, missiles and drones
> > rely on GPS navigation, and successful spoofing would make it impossible
> > for them to hit their targets.
> > >
> > >
> > >     But now the geolocation interference is being used far away from the
> > Kremlin. Some worry that this means that spoofing is getting easier. GPS
> > spoofing previously required considerable technical expertise. Humphreys
> > had to build his first spoofer from scratch in 2008, but notes that it can
> > now be done with commercial hardware and software downloaded from the
> > Internet.
> > >
> > >
> > >     Nor does it require much power. Satellite signals are very weak –
> > about 20 watts from 20,000 miles away – so a one-watt transmitter on a
> > hilltop, plane or drone is enough to spoof everything out to the horizon.
> > >
> > >
> > >     If the hardware and software are becoming more accessible, nation
> > states soon won’t be the only ones using the technology. This is within the
> > scope of any competent hacker http://www.comsoc.org/ctn/
> > lost-space-how-secure-future-mobile-positioning . There have not yet been
> > any authenticated reports of criminal spoofing, but it should not be
> > difficult for criminals to use it to divert a driverless vehicle
> > https://www.newscientist.com/article/2142059-sneaky-
> > attacks-trick-ais-into-seeing-or-hearing-whats-not-there/  or drone
> > delivery, or to hijack an autonomous ship. Spoofing will give everyone
> > affected the same location, so a hijacker would just need a short-ranged
> > system to affect one vehicle.
> > >
> > >
> > >     But Humphreys believes that spoofing by a state operator is the more
> > serious threat. “It affects safety-of-life operations over a large area,”
> > he says. “In congested waters with poor weather, such as the English
> > Channel, it would likely cause great confusion, and probably collisions.”
> > >
> > >
> > >     Last says that the Black Sea incident suggests a new device capable
> > of causing widespread disruption, for example, if used in the ongoing
> > dispute with Ukraine. “My gut feeling is that this is a test of a system
> > which will be used in anger at some other time.”
> > >
> > >
> > >     73’s
> > >     webmaster
> > _______________________________________________
> > YCCC Reflector mailto:y...@contesting.com
> > Yankee Clipper Contest Club  http://www.yccc.org
> > Reflector Info: http://lists.contesting.com/mailman/listinfo/yccc
> >
> >
> >
> > ---
> > This email has been checked for viruses by Avast antivirus software.
> > https://www.avast.com/antivirus
> >
> > _______________________________________________
> > time-nuts mailing list -- time-nuts@febo.com
> > To unsubscribe, go to https://www.febo.com/cgi-bin/
> > mailman/listinfo/time-nuts
> > and follow the instructions there.
> >
> 
> 
> 
> -- 
> Clint.
> 
> *No trees were harmed in the sending of this mail. However, a large
> number
> of electrons were greatly inconvenienced.*
> _______________________________________________
> time-nuts mailing list -- time-nuts@febo.com
> To unsubscribe, go to
> https://www.febo.com/cgi-bin/mailman/listinfo/time-nuts
> and follow the instructions there.
_______________________________________________
time-nuts mailing list -- time-nuts@febo.com
To unsubscribe, go to https://www.febo.com/cgi-bin/mailman/listinfo/time-nuts
and follow the instructions there.

Reply via email to