How to Defend Against GPS Spoofing Attacks – Wall Street Journal

September 20, 2018

Written by Editor

Spoofer Inside GNSS

Blog Editor’s Note: Spoofing seems to have become the concern of the moment, almost eclipsing jamming/denial of service in the public consciousness. Certainly the idea of hazardously misleading information is more disturbing than no information at all. Interestingly, real-world tests have shown that jamming incidents often start as something that looks to the user like spoofing. As receivers move into an area being jammed, they often drift away from true before displaying indications of no solution/service.

How to Defend Against GPS Spoofing Attacks

By: Adam Janofsky

The Wall Street Journal

18 September 2018

As ship and car makers race to roll-out self-driving technology, security researchers warn that attacks using fake GPS signals could increase and become more dangerous.

U.S. government agencies including the National Science Foundation and the Department of Homeland Security have elevated the issue over the past year, issuing grants and guidance to address what’s known as GPS spoofing.

GPS, or the Global Positioning System, was developed by the U.S. government for military navigation but is accessible to anyone with a GPS receiver. These devices retrieve information from about 30 Department of Defense satellites, and that data is used to calculate the device’s geographic location in real time.

GPS spoofing tricks these devices into collecting fake GPS signals, which leads them to calculate incorrect locations or travel times, according to Lee Neubecker, an independent cybersecurity researcher who has written about such attacks.

“Many cargo ships are increasingly dependent on GPS for navigation and steering,” said Mr. Neubecker, who founded computer forensics firm Forensicon Inc. and sold it in 2016 to electronic-discovery firm QDiscovery LLC.

“With spoofing, you can’t rely on a computer to solely control a ship or vehicle,” he advised. “You need other systems to set off alarms and alerts that aren’t so computer-dependent.”

Steering Vehicles into Danger

The NSF issued grants this year to researchers working on ways to understand and prevent spoofing attacks. One paper funded by the NSF and published in July by researchers at Virginia Tech, Microsoft Research and the University of Electronic Science and Technology of China, demonstrated how hackers could use such an attack to steer an automobile to the wrong destination — or into danger.

“The problem is critical considering that navigation systems are actively used by billions of drivers on the road and play a key role in autonomous vehicles,” the researchers wrote.

The team used a $223 portable spoofing device to feed a car’s navigation system with what they called a “ghost route.” When tested on 40 drivers in the U.S. and China, 95% followed the navigation to the wrong destination without noticing the directions were wrong.

Real-world spoofing attacks have been reported but are difficult to corroborate. In 2017, the captain of a ship traveling to the Russian port of Novorossiysk noticed that his navigation system displayed its location about 30 miles away, at an airport, Wired reported. In June and December 2017, the Maritime Administration with the U.S. Department of Transportation warned of GPS interference reported in the Black Sea. “GPS disruptions are a global concern,” a Maritime Administration bulletin said.

Researchers also have demonstrated how GPS spoofing might interfere with self-driving cars. However, these vehicles use a number of additional tools, such as pulsed laser light, to obtain a more detailed view of their surroundings than using GPS alone.

Guidance published by the Department of Homeland Security in 2017 recommends a number of measures that can help organizations avoid GPS spoofing and related attacks. Safeguards include obscuring antennas or installing decoy antennas to throw off attackers, adding sensors that can detect spoofing signals and send alerts to remote monitoring sites, and installing several antennas in different locations, which allow personnel to monitor for GPS discrepancies and other indicators of an attack.

DHS also called on GPS device manufacturers to implement anti-spoofing technology that recognizes, rejects and reports spoofing signals. “Upon recognition and reporting of spoofing signals, the unit should hand over to a backup sensor [such as a] precision clock [or] inertial sensors,” DHS said.

Rockwell Collins Inc., a manufacturer of military navigation satellite systems, said it uses Selective Availability Anti-Spoofing Module-based GPS receivers. This technology uses encryption to verify that GPS signals come from legitimate sources.

Original Article

What Can YOU Do? How Can YOU Help?

PNT is the quiet backbone of everything but too many leaders still don’t see the risk.

But you do. You understand the systems, the dependencies, the failure chains. That insight is rare — and it’s exactly what your country needs right now. Contact your government leaders and industry decision-makers and tell them resilient PNT isn’t a feature — it’s the foundation everything else depends on.

Start the Conversation

Use our Resilient PNT Key Talking Points to make the case.

U.S. Advocates

Find your representatives at Congress.gov, then use our email template to reach them in minutes.

When you get a response, let us know. Every conversation strengthens the mission.

More PNT News

“We can track Starlink users…” – Fast Company

“We can track Starlink users…” – Fast Company

Image: Shutterstock What's new: A report that multiple companies are offering governments the ability to geolocate Starlink terminals.  Why it's important: Security concerns - an adversary could target, kidnap, kill, etc. users. Privacy concerns - user location data...

Honeybees teach drones how to navigate without GPS – Cybernews

Honeybees teach drones how to navigate without GPS – Cybernews

Image: Shutterstock What's new: An interesting form of autonomous navigation based on nature. Why it's important: Autonomous systems have an important place in an overall PNT architecture. For some applications they are the best/only method. This system uses just 42...

PNT cyber guidance update – NIST wants your input

PNT cyber guidance update – NIST wants your input

Image: RNT Foundation What's new: Draft updated PNT cyber guidance from NIST. They are seeking public comment and input. Why it's important: PNT and cyber are well intertwined. PNT is an essential tech infrastructure so protecting it from malicious cyber effects is...

GPS Is Not Guaranteed: Impact on ports (Webinar 21 May)

GPS Is Not Guaranteed: Impact on ports (Webinar 21 May)

Image: Shutterstock What's new: A webinar featuring our colleague Matt Shirley. Matt is a professional port pilot and has some interesting insights on maritime reliance on GPS/GNSS, how things could go wrong without resilient PNT, and how things could go better with...

Get PNT News in Your Inbox