Jamming & Spoofing Resources

GPS/GNSS Jamming & Spoofing Resource Center

Jamming & Spoofing Resources

Executive Order on Strengthening National Resilience through Responsible Use of Positioning, Navigation, and Timing Services >>

GPS/GNSS jamming and spoofing attacks are on the rise. The combination of low-cost hardware, open source software, and tutorials on YouTube have fostered the proliferation of these malicious acts. Beyond intentional disruption, other factors such as environmental conditions and conflicts with other electronic systems can result in unreliable or even unavailable GNSS data.

Now more than ever, it’s critical to protect your GNSS-dependent positioning, navigation and timing (PNT) systems.

At Orolia, we offer comprehensive anti-jamming and anti-spoofing solutions, from initial vulnerability testing to integrated interference, detection and mitigation (IDM) solutions to ongoing testing, simulation and monitoring.

Jamming Spoofing White Paper

White Paper

Protecting the U.S. Military From GPS Jamming and Spoofing

This white paper from C4ISRNET discusses how preparation and countermeasures can assure U.S. forces maintain critical GPS capabilities.

Jamming and Spoofing in the News

From the Orolia Blog

By Jeremy Onyan, Director of Time Sensitive Networks
 

In 2013, the Federal Communications Commission fined a person almost $32k for using a device intended to evade the fleet management tracking system on his company vehicle. The device in question: a GPS jammer.

White Papers and Resources

Title
As the sophistication of GPS/GNSS spoofing attacks increase, the tools used to test against these threats must also evolve. Software-defined simulators with advanced spoofing scenarios help ensure that critical systems can operate in these environments.
pdf - 2 MB—  May 7, 2020 [ Permalink ]

This article was originally presented at the 2014 PTTI conference. It describes various approaches to a disciplining algorithm to detect and mitigate the effect of GNSS spoofing on precision time signals.

pdf - 914 KB—  December 1, 2014 [ Permalink ]
Spoofing is an attempt to deceive the GNSS/GPS receiver by broadcasting signals that the receiver will use instead of the live sky signals. This article describes a test system for spoofing allows testing the three major factors to consider in a spoofing attack, time synchronization to the signals to be spoofed, power level of the spoofing signal compared to the live sky signals, and accuracy of the position obtained by the spoofing signal to that of the actual position of the device being spoofed. Using a spoofing test system will allow a user to better understand the receiver and harden the system against spoofing attacks.
pdf - 673 KB—  December 8, 2015 [ Permalink ]

Hardening GPS/GNSS receivers against spoofing and jamming is crucial as threats are new, real and increasing. Testing with a GPS/GNSS simulator is a very effective tool for designing and evaluating countermeasures for mission-critical applications for positioning, navigation and timing. This presentation describes the application for testing spoofing.

pdf - 2 MB—  March 10, 2016 [ Permalink ]
Positioning, navigation and timing (PNT) services are indispensable, and providing trusted, resilient PNT solutions requires us to look beyond individual systems and methodologies to focus upon the user. An architecture that can meet this demand must include multiple systems with diverse technologies so that any single threat or source of disruption can be mitigated. This document discusses how signaling technologies such as GNSS, eLoran and STL are the complementary components of this architecture.
pdf - 583 KB—  May 9, 2018 [ Permalink ]
Today's time sensitive networks rely on available and accurate positioning, navigation and timing (PNT) signals to provide leaders with the information required to make timely and effective decisions. The proliferation of GNSS-degrading and denying devices across state and non-state actors put this critical information capability in jeopardy. Learn how a combination of alternative PNT signals with traditional GNSS references makes PNT applications resilient against jamming and spoofing.
White Paper—  May 11, 2018 [ Permalink ]
Reliance on GNSS is now commonplace. However, all GNSS systems share a common vulnerability: their signals are very weak. GNSS satellites operate from Mid-Earth Orbit (MEO), approximately 20,000-25,000 km above the earth, to provide the best coverage and geometry for triangulation. As such, the transmitted signal is extremely weak upon arrival at the surface of the earth – so weak that it is weaker than the surrounding radio noise. Special signal processing techniques recover the GNSS signal from the background noise, but the weak signal strength at the user’s receivers makes GNSS navigation very susceptible to interference.
pdf - 641 KB—  July 2, 2019 [ Permalink ]

Case Studies

Alternative Signals

With an encrypted signal 1000x stronger than GPS/GNSS, STL Satellite Time & Location (STL) is an ideal solution to augment GPS/GNSS signals and provide additional resiliency for critical networks.

It works indoors where other GNSS signals can't reach. It’s the perfect standalone reference when you want to "cut the cord" or when roof access isn’t an option.

Orolia Products and Services

Vulnerability Testing

When it’s mission critical, you need to know your PNT risks and vulnerabilities. We can help.


Interference Detection & Mitigation (IDM)


Ongoing Testing and Simulation

To harden and protect your critical infrastructure Request a Quote today.