Incredibly interesting article about GPS spoofing and the theoretical “hijacking” of a truck via Schneier on Security.
Jon Warner of Argonne National Laboratories set out to examine GPS security one Saturday afternoon. Jon is part of the Vulnerability Assessment Team (VAT), a small group whose goal is to uncover flaws in our systems so that they can be fixed. â€œWe try to think like the bad guys,â€ Jon said, â€œso that we can plug the holes they might use.â€
To test out GPS security, Roger Johnston, head of the VAT, challenged the team to demonstrate how to steal a cargo truck and get away with it. Cargo trucks generally contain a GPS tracking device which relays position and speed information to a central office. This enables freight companies to track their driversâ€™ locations and ensure that trucks are on course. If a truck veers off course, it sets off an alarm at headquarters. If an attacker could falsify or â€œspoofâ€ GPS information, he or she could hijack the truck and steal the cargo without being noticed.
6 thoughts on “GPS spoofing”
GPS Delay Spoofing Experiments
For more information about the Vulnerability Assessment Team (VAT) at Argonne National Laboratory visit the VAT website at http://www.ne.anl.gov/capabilities/vat/
You can now use a GPS RF recorder & Replayer to do these kinds of tests/spoofing. The GPS Simulator http://www.labsat.co.uk costs ~$8000 and will playback the raw GPS RF data wirelessly into almost any kind of GPS.
Comments are closed.