TAG: spoofing

Expert Advice: The Low Cost of Protecting America

January 1, 2014By

By Dana A. Goward Highly precise and free for use by anyone with an inexpensive receiver, GPS and other GNSS are great. Their navigation and timing signals have been incorporated into nearly every aspect of modern life, from synchronizing power grids to financial systems, the Internet, telecommunications, and transportation. The U.S. Department of Homeland Security estimates that these signals are... read more

Qinetiq, Rockwell Demonstrate Multi-Constellation Galileo/GPS Secure Positioning for Governmental Applications

November 12, 2013By

On August 30, QinetiQ and Rockwell Collins demonstrated the first joint satellite navigation positioning using live signals from the encrypted governmental services from the U.S. Department of Defense (DOD) GPS Precise Positioning Service (GPS-PPS) and the new European Galileo Public Regulated Service (PRS). The signals on GPS L1 and L2, together with Galileo PRS L1A and E6A, were processed and... read more

Spirent Demonstrates Solution That Helps Reduce GNSS Vulnerability

September 18, 2013By
Spirent-Qascom

Spirent Communications, a navigation and positioning systems testing company, has teamed up with Qascom, an expert in GNSS signal security and authentication, to develop a test tool that reproduces spoofing attacks in a controlled laboratory environment. The collaborative solution will be launched commercially later in 2013, and was previewed at ION GNSS+ in September in Nashville, Tennessee. The test bed... read more

GPS Source Receives USAF GPS Directorate Approval for GLI-FLO

July 29, 2013By
GPS Source's GLI-FLO.

GPS Source announced today that GLI-FLO has been granted security approval by the U.S. Air Force Global Positioning Systems Directorate. The GPS Directorate security approval provides GPS Source with the opportunity to supply military end-users and prime contractors with a DAGR Distributed Device (D3) that meets the mandate for reliability and security, GPS Source said. GLI-FLO is a secure (ICD-GPS-153... read more

This article is tagged with , , , , and posted in Defense News, GNSS News, Government News, Latest News, Warfighter

Innovation: GNSS Spoofing Detection

June 1, 2013By
In-opener

It's a hostile (electronic) world out there, people. Our wired and radio-based communication systems are constantly under attack from evil doers. We are all familiar with computer viruses and worms hiding in malicious software or malware distributed over the Internet or by infected USB flash drives. Trojan horses are particularly insidious. These are programs concealing harmful code that can lead to many undesirable effects such as deleting a user’s files or installing additional harmful software. Such programs pass themselves off as benign, just like the “gift” the Greeks delivered to the Trojans as reported in Virgil’s Aeneid. This was a very early example of spoofing. read more

This article is tagged with , and posted in From the Magazine, GNSS, Innovation

ITT Exelis Completes Signal Sentry 1000 Product Integration

May 17, 2013By
SignalSentry1000

An ITT Exelis product that detects and locates GPS interference sources in 3-D by using longitude, latitude and altitude has successfully completed a significant integration milestone. Signal Sentry 1000, formerly known as GPS Interference, Detection and Geolocation, may now be deployed to collect actionable intelligence for law enforcement, such as tracking high-value targets and protecting critical infrastructure. Signal Sentry 1000... read more

Drone Hack: Spoofing Attack Demonstration on a Civilian Unmanned Aerial Vehicle

August 1, 2012By
drone_toc-650

By Daniel Shepard, Jahshan A. Bhatti, and Todd E. Humphreys  Unmanned aerial vehicle (uav) used in the spoofing tests; owned by the University of Texas.  A radio signal sent from a half-mile away deceived the GPS receiver of a UAV into thinking that it was rising straight up. In this way, the UAV’s dependence on civil GPS allowed the... read more

Going Up Against Time: The Power Grid’s Vulnerability to GPS Spoofing Attacks

August 1, 2012By
Figure 7. Oscilloscope and Synchrowave screen at about 870 seconds, point 4 in Figure 3.

Spoofing tests against phasor measurement units demonstrate their vulnerability to attack. A generator trip in an automatic control scheme could be falsely activated by the GPS spoofing, possibly leading to cascading faults and a large-scale power blackout. read more

This article is tagged with , , and posted in Timing, Wireless Infrastructure