GPS Cyberattack
Evidence suggests that a new type of cyberweapon may be able to throw GPS-enabled devices off course – a technique known as “spoofing.” If confirmed, experts are concerned that it would make it difficult to guard against rogue operatives diverting self-driving vehicles, hijacking autonomous ships and even preventing guided missiles from hitting their targets.
Earlier this year, in what appeared to be an isolated incident, one ship navigating in the Black Sea found itself 32 kilometers off course. But upon further investigation, it was discovered that at least 20 other ships were affected. In Moscow, it has also been reported that users of GPS-based phone apps like Pokemon Go experienced problems in the area around the Kremlin in which the app placed them at the airport 32 kilometers away.
While GPS jamming has long been a concern, it’s easy enough to detect because the signal is totally lost. In the case of spoofing, it’s much more difficult to distinguish because real signals are replaced by misdirection. And some worry that spoofing is getting easier, not only for state operatives but for any reasonably competent hacker.
More research will be needed to come up with a way of authenticating GPS signals. Or we may need to revitalize the World War II-era radio navigation system known as Loran, which requires a large, complex antenna system that could detect and isolate spoofing activity. Whatever the solution, it would serve us well to remember that technology is a tool, not a replacement for human vigilance.
For information: Todd Humphreys, University of Texas at Austin, Radionavigation Laboratory, WR4141, MC C0600, Austin, TX 78712; phone: 512-471-4489; email: todd.humphreys@mail.utexas.edu; Web site: https://radionavlab.ae.utexas.edu/