Skip to main content

GPS vulnerable to dangerous hacks and spamming


The South Korean government has reported that electronic jamming signals from North Korea were affecting communications and GPS signals for passenger aircraft. So far, there has not been a serious threat to safety because the pilots were able to use supplemental navigation devices.
But how does a group disrupt signals from GPS or other communication systems in the first place?
The simplest way to is to drown them out in a barrage of other signals, said Adrian Graham, a consultant in electronic warfare and the author of a textbook on the subject. That means sending out a radio signal over a wide range of frequencies similar to the ones that GPS uses. Because GPS signals are not that strong, barrage jamming is rather like blasting music in a room and drowning out conversation. Another method is to drown out the satellite signal by beaming a narrowband signal directly to the GPS receiver, if its location is known.

"Even a very low-power jammer is very effective," Graham told Discovery News .
But to really hack GPS and create a safety hazard requires that one spoofs or falsifies the data the receiver gets. To do this one might duplicate a GPS signal and play it back to a passing aircraft with a slight variation to the time signal. Since a signal broadcast from the ground would be stronger than the ones coming from orbiting satellites, the plane's GPS receiver would lock on to the fake one. The pilot wouldn't know what was happening — his GPS unit would give him a position that looked perfectly legitimate, but would gradually lead him away from his destination.
"If this brings a victim aircraft into hostile territory, it can in the worst case be shot down, with the culprit country being able to say that the aircraft strayed into restricted airspace," Graham said.
GPS isn't the only kind of communication signal that can be messed with. The U.S. military has several aircraft that are designed specifically to disrupt enemy communications. The EA-18G Growler, for instance, has been in service for the last three years and is capable of jamming enemy radar and communications, as well as destroying the installations.
Jamming communications and radar has a long history, going back at least to World War II. Some early versions of stealth technology involved aircraft generating a signal at the same frequency as the radar. More sophisticated versions of the technique were used during the Vietnam War.
Variations in that method are used today, said Stan VanDerWerf, president of Advanced Capitol, a consulting firm, and a former chief of electronic warfare and avionics at the Warner Robins Air Logistics Center at Robins Air Force Base. "Enemy radar is looking for ours," he said. "But we have a jammer, which receives energy from the radar, emulates the signal and sends it back out."
It won't make the target plane invisible, but it will make the radar operator's screen show misleading information that’s harder to decipher. A similar technique is used to fool radar-guided missiles into under- or over-estimating the speeds of their targets.
With digital communications, the problem of interference has become more complicated. Digital signals generally operate at lower power than their old-line analog cousins, so they are more vulnerable in some respects.
"Smart jamming" is a method that attacks specific digital networks, such as those for mobile phones, while leaving others intact. It involves attacking the network, as opposed to the signal. A hacker calls the local cell tower's base station, which is responsible for routing the calls through the network, and tells it to ignore everyone. The computer isn't smart enough to recognize the hack, and stops listening to the cell phone signals coming in. As a result, the calls don't go through.
Another method is to generate a signal that sounds to the phone just like a cell phone tower. Since the phone automatically locks onto the strongest signal around, it will go to the fake cell tower. The fake cell phone tower receives the signal and responds with a message that says, essentially, "Sure I will route your call," but then it does nothing.
In France, prisons use it to stop inmates from using cell phones. In the United States, jamming mobile phone communications is illegal, and the Federal Communications Commission in October said it was targeting retailers that say they sell devices designed to block mobile phones. But there is an ongoing debate about whether such technology should be available for correctional facilities. South Carolina petitioned the FCC to be allowed to do it, and selective call-blocking technology is used in some Mississippi prisons.
"Anything in the electromagnetic spectrum, these principles can be applied," VanDerWerf said.
The real problem for aircraft, especially civilian ones, is that jamming isn't visible. Many modern airplanes also use electronic compasses that are fed information form the GPS receivers. "You probably don't know you are being jammed — there will likely be no indication," Graham said. "If it is cloudy or night you will have no external reference."

Comments

Popular posts from this blog

How to Hack a Website in Four Easy Steps

Every wondered how Anonymous and other hacktivists manage to steal the data or crash the servers of websites belonging to some of the world biggest organisations? Thanks to freely available online tools, hacking is no long the  preserve of geeks , so we've decided to show you how easy it is to do, in just four easy steps. Step 1: Identify your target While  Anonymous  and other online hacktivists may choose their targets in order to protest against perceived wrong-doing, for a beginner wanting to get the taste of success with their first hack, the best thing to do is to identify a any website which has a vulnerability. Recently a hacker posted a list of 5,000 websites online which were vulnerable to attack. How did he/she identify these websites? Well, the key to creating a list of websites which are likely to be more open to attack, is to carry out a search for what is called a Google Dork. Google Dorking , also known as Google Hacking, enables you find sen

How to Hack Facebook Password in 5 Ways

Check out the following post from  fonelovetz blog  on facebook account hacking. This is one of the most popular questions which I'm asked via my email.And today I'm going to solve this problem one it for all.Even though i have already written a few ways of hacking a facebook password.Looks like i got to tidy up the the stuff here.The first thing i want to tell is.You can not hack or crack a facebook password by a click of a button.That's totally impossible and if you find such tools on the internet then please don't waste your time by looking at them! They are all fake.Ok now let me tell you how to hack a facebook account. I'll be telling you 5 of the basic ways in which a beginner hacker would hack.They are: 1.Social Engineering 2.Keylogging 3.Reverting Password / Password Recovery Through Primary Email 4.Facebook Phishing Page/ Softwares 5.Stealers/RATS/Trojans I'll explain each of these one by one in brief.If you want to know more about them just

How to Hack Someone's Cell Phone to Steal Their Pictures

Do you ever wonder how all these celebrities continue to have their private photos spread all over the internet? While celebrities' phones and computers are forever vulnerable to attacks, the common folk must also be wary. No matter how careful you think you were went you sent those "candid" photos to your ex, with a little effort and access to public information, your pictures can be snagged, too. Here's how. Cloud Storage Apple's iCloud service provides a hassle free way to store and transfer photos and other media across multiple devices. While the commercial exemplifies the G-rated community of iPhone users, there are a bunch of non-soccer moms that use their iPhones in a more..."free spirited" mindset. With Photo Stream enabled (requires OS X Lion or later, iOS 5 or later), pictures taken on your iPhone go to directly to your computer and/or tablet, all while being stored in the cloud. If you think the cloud is safe, just ask Gizmodo

How to Hack Samsung Phone Screen Lock

I have discovered  another  security flaw in Samsung Android phones. It is possible to completely disable the lock screen and get access to any app - even when the phone is "securely" locked with a pattern, PIN, password, or face detection. Unlike another recently released flaw, this doesn't rely quite so heavily on ultra-precise timing. Video . Of course, if you are unable to download a screen unlocker, this security vulnerability still allows you to  dial any phone number and run any app ! HOWTO From the lock screen, hit the emergency call button. Dial a non-existent emergency services number - e.g. 0. Press the green dial icon. Dismiss the error message. Press the phone's back button. The app's screen will be briefly displayed. This is just about long enough to interact with the app. Using this, you can run and interact with any app / widget / settings menu. You can also use this to launch the dialler. From there, you can dial any phone