Hi

Time is one more thing the spoofer needs to consider. It does not eliminate the
ability to spoof, it just adds one more factor to his setup. If he’s got a 
“clear” GPS
signal to base his spoof on, that gives him a timebase to use. 

Bob

> On Aug 14, 2017, at 12:09 PM, Tim Shoppa <tsho...@gmail.com> wrote:
> 
> Bringing this back around to time-nuts - wouldn't the timescale
> discontinuity at the receiver, be a powerful clue that spoofing was going
> on? But these being navigation receivers they aren't looking so critically
> at the time.
> 
> Presumably this was a single-transmitter jammer that pretended it was a
> whole GPS constellation.
> 
> A 32 kilometer jump in position would've been a 10 to 100 microsecond time
> jump for at least some of the receivers in that section of the Black Sea.
> And 10 microseconds sticks out like a sore thumb to a time nut.
> 
> I think if you are only trying to spoof a single receiver it would be
> possible to walk a spoofed time/space code in a way that time moved without
> so obvious of a discontinuity. I'm sure there would be effects a time-nut
> could notice still.
> 
> Tim N3QE
> 
> 
> On Sat, Aug 12, 2017 at 5:23 PM, John Allen <j...@pcsupportsolutions.com>
> wrote:
> 
>> FYI, John K1AE
>> 
>> -----Original Message-----
>> From: YCCC [mailto:yccc-boun...@contesting.com] On Behalf Of ROBERT
>> DOHERTY
>> Sent: Saturday, August 12, 2017 9:26 AM
>> To: YCCC Reflector
>> Subject: [YCCC] Fwd: Re: [Radio Officers, &c] Ships fooled in GPS spoofing
>> attack suggest Russian cyberweapon
>> 
>> As if there were not enough problems in the world .....
>> 
>> Whitey  K1VV
>> 
>>>    Date: August 12, 2017 at 7:37 AM
>>>    Subject: Re: [Radio Officers, &c] Ships fooled in GPS spoofing
>> attack suggest Russian cyberweapon
>>> 
>>>    Ships fooled in GPS spoofing attack suggest Russian cyberweapon
>>> 
>>>    News from: New Scientis (article reported by R/O Luca Milone –
>> IZ7GEG)
>>> 
>>>    https://www.newscientist.com/article/2143499-ships-fooled-
>> in-gps-spoofing-attack-suggest-russian-cyberweapon/#.
>> WY6zNfZq1VA.google_plusone_share https://www.newscientist.com/
>> article/2143499-ships-fooled-in-gps-spoofing-attack-
>> suggest-russian-cyberweapon/#.WY6zNfZq1VA.google_plusone_share
>>> 
>>> 
>>>    On date: 10 August 2017
>>> 
>>>    By David Hambling
>>> 
>>> 
>>>    Reports of satellite navigation problems in the Black Sea suggest
>> that Russia may be testing a new system for spoofing GPS, New Scientist has
>> learned. This could be the first hint of a new form of electronic warfare
>> available to everyone from rogue nation states to petty criminals.
>>> 
>>> 
>>>    On 22 June, the US Maritime Administration filed a seemingly bland
>> incident report. The master of a ship off the Russian port of Novorossiysk
>> had discovered his GPS put him in the wrong spot – more than 32 kilometres
>> inland, at Gelendzhik Airport.
>>> 
>>> 
>>>    After checking the navigation equipment was working properly, the
>> captain contacted other nearby ships. Their AIS traces – signals from the
>> automatic identification system used to track vessels – placed them all at
>> the same airport. At least 20 ships were affected
>> http://maritime-executive.com/editorials/mass-gps-spoofing-
>> attack-in-black-sea .
>>> 
>>> 
>>>    While the incident is not yet confirmed, experts think this is the
>> first documented use of GPS misdirection – https://www.marad.dot.gov/
>> msci/alert/2017/2017-005a-gps-interference-black-sea/  a spoofing attack
>> that has long been warned of but never been seen in the wild.
>>> 
>>> 
>>>    Until now, the biggest worry for GPS has been it can be jammed
>> https://www.newscientist.com/article/dn20202-gps-chaos-how-
>> a-30-box-can-jam-your-life/  by masking the GPS satellite signal with
>> noise. While this can cause chaos, it is also easy to detect. GPS receivers
>> sound an alarm when they lose the signal due to jamming. Spoofing is more
>> insidious: a false signal from a ground station simply confuses a satellite
>> receiver. “Jamming just causes the receiver to die, spoofing causes the
>> receiver to lie,” says consultant David Last
>> http://www.professordavidlast.co.uk/ , former president of the UK’s Royal
>> Institute of Navigation.
>>> 
>>> 
>>>    Todd Humphreys http://www.ae.utexas.edu/faculty/faculty-directory/
>> humphreys , of the University of Texas at Austin, has been warning of the
>> coming danger of GPS spoofing for many years. In 2013, he showed how a
>> superyacht with state-of-the-art navigation could be lured off-course by
>> GPS spoofing. “The receiver’s behaviour in the Black Sea incident was much
>> like during the controlled attacks http://onlinelibrary.wiley.
>> com/doi/10.1002/navi.183/full  my team conducted,” says Humphreys.
>>> 
>>> 
>>>    Humphreys thinks this is Russia experimenting with a new form of
>> electronic warfare. Over the past year, GPS spoofing has been causing chaos
>> for the receivers on phone apps in central Moscow to misbehave
>> https://themoscowtimes.com/articles/the-kremlin-eats-gps-
>> for-breakfast-55823 . The scale of the problem did not become apparent
>> until people began trying to play Pokemon Go. The fake signal, which seems
>> to centre on the Kremlin, relocates anyone nearby to Vnukovo Airport
>> http://www.thetruthaboutcars.com/2017/01/bizarre-gps-
>> spoofing-means-drivers-near-kremlin-always-airport/ , 32 km away. This is
>> probably for defensive reasons; many NATO guided bombs, missiles and drones
>> rely on GPS navigation, and successful spoofing would make it impossible
>> for them to hit their targets.
>>> 
>>> 
>>>    But now the geolocation interference is being used far away from the
>> Kremlin. Some worry that this means that spoofing is getting easier. GPS
>> spoofing previously required considerable technical expertise. Humphreys
>> had to build his first spoofer from scratch in 2008, but notes that it can
>> now be done with commercial hardware and software downloaded from the
>> Internet.
>>> 
>>> 
>>>    Nor does it require much power. Satellite signals are very weak –
>> about 20 watts from 20,000 miles away – so a one-watt transmitter on a
>> hilltop, plane or drone is enough to spoof everything out to the horizon.
>>> 
>>> 
>>>    If the hardware and software are becoming more accessible, nation
>> states soon won’t be the only ones using the technology. This is within the
>> scope of any competent hacker http://www.comsoc.org/ctn/
>> lost-space-how-secure-future-mobile-positioning . There have not yet been
>> any authenticated reports of criminal spoofing, but it should not be
>> difficult for criminals to use it to divert a driverless vehicle
>> https://www.newscientist.com/article/2142059-sneaky-
>> attacks-trick-ais-into-seeing-or-hearing-whats-not-there/  or drone
>> delivery, or to hijack an autonomous ship. Spoofing will give everyone
>> affected the same location, so a hijacker would just need a short-ranged
>> system to affect one vehicle.
>>> 
>>> 
>>>    But Humphreys believes that spoofing by a state operator is the more
>> serious threat. “It affects safety-of-life operations over a large area,”
>> he says. “In congested waters with poor weather, such as the English
>> Channel, it would likely cause great confusion, and probably collisions.”
>>> 
>>> 
>>>    Last says that the Black Sea incident suggests a new device capable
>> of causing widespread disruption, for example, if used in the ongoing
>> dispute with Ukraine. “My gut feeling is that this is a test of a system
>> which will be used in anger at some other time.”
>>> 
>>> 
>>>    73’s
>>>    webmaster
>> _______________________________________________
>> YCCC Reflector mailto:y...@contesting.com
>> Yankee Clipper Contest Club  http://www.yccc.org
>> Reflector Info: http://lists.contesting.com/mailman/listinfo/yccc
>> 
>> 
>> 
>> ---
>> This email has been checked for viruses by Avast antivirus software.
>> https://www.avast.com/antivirus
>> 
>> _______________________________________________
>> time-nuts mailing list -- time-nuts@febo.com
>> To unsubscribe, go to https://www.febo.com/cgi-bin/
>> mailman/listinfo/time-nuts
>> and follow the instructions there.
>> 
> _______________________________________________
> time-nuts mailing list -- time-nuts@febo.com
> To unsubscribe, go to https://www.febo.com/cgi-bin/mailman/listinfo/time-nuts
> and follow the instructions there.

_______________________________________________
time-nuts mailing list -- time-nuts@febo.com
To unsubscribe, go to https://www.febo.com/cgi-bin/mailman/listinfo/time-nuts
and follow the instructions there.

Reply via email to