John Allen
2017-08-12 21:23:15 UTC
FYI, John K1AE
-----Original Message-----
From: YCCC [mailto:yccc-***@contesting.com] On Behalf Of ROBERT DOHERTY
Sent: Saturday, August 12, 2017 9:26 AM
To: YCCC Reflector
Subject: [YCCC] Fwd: Re: [Radio Officers, &c] Ships fooled in GPS spoofing attack suggest Russian cyberweapon
As if there were not enough problems in the world .....
Whitey K1VV
YCCC Reflector mailto:***@contesting.com
Yankee Clipper Contest Club http://www.yccc.org
Reflector Info: http://lists.contesting.com/mailman/listinfo/yccc
---
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus
_______________________________________________
time-nuts mailing list -- time-***@febo.com
To unsubscribe, go to https://www.febo.com/cgi-bin/mailman/listinfo/time-nuts
and follow the instructions there.
-----Original Message-----
From: YCCC [mailto:yccc-***@contesting.com] On Behalf Of ROBERT DOHERTY
Sent: Saturday, August 12, 2017 9:26 AM
To: YCCC Reflector
Subject: [YCCC] Fwd: Re: [Radio Officers, &c] Ships fooled in GPS spoofing attack suggest Russian cyberweapon
As if there were not enough problems in the world .....
Whitey K1VV
Date: August 12, 2017 at 7:37 AM
Subject: Re: [Radio Officers, &c] Ships fooled in GPS spoofing attack suggest Russian cyberweapon
Ships fooled in GPS spoofing attack suggest Russian cyberweapon
News from: New Scientis (article reported by R/O Luca Milone – IZ7GEG)
https://www.newscientist.com/article/2143499-ships-fooled-in-gps-spoofing-attack-suggest-russian-cyberweapon/#.WY6zNfZq1VA.google_plusone_share https://www.newscientist.com/article/2143499-ships-fooled-in-gps-spoofing-attack-suggest-russian-cyberweapon/#.WY6zNfZq1VA.google_plusone_share
On date: 10 August 2017
By David Hambling
Reports of satellite navigation problems in the Black Sea suggest that Russia may be testing a new system for spoofing GPS, New Scientist has learned. This could be the first hint of a new form of electronic warfare available to everyone from rogue nation states to petty criminals.
On 22 June, the US Maritime Administration filed a seemingly bland incident report. The master of a ship off the Russian port of Novorossiysk had discovered his GPS put him in the wrong spot – more than 32 kilometres inland, at Gelendzhik Airport.
After checking the navigation equipment was working properly, the captain contacted other nearby ships. Their AIS traces – signals from the automatic identification system used to track vessels – placed them all at the same airport. At least 20 ships were affected http://maritime-executive.com/editorials/mass-gps-spoofing-attack-in-black-sea .
While the incident is not yet confirmed, experts think this is the first documented use of GPS misdirection – https://www.marad.dot.gov/msci/alert/2017/2017-005a-gps-interference-black-sea/ a spoofing attack that has long been warned of but never been seen in the wild.
Until now, the biggest worry for GPS has been it can be jammed https://www.newscientist.com/article/dn20202-gps-chaos-how-a-30-box-can-jam-your-life/ by masking the GPS satellite signal with noise. While this can cause chaos, it is also easy to detect. GPS receivers sound an alarm when they lose the signal due to jamming. Spoofing is more insidious: a false signal from a ground station simply confuses a satellite receiver. “Jamming just causes the receiver to die, spoofing causes the receiver to lie,” says consultant David Last http://www.professordavidlast.co.uk/ , former president of the UK’s Royal Institute of Navigation.
Todd Humphreys http://www.ae.utexas.edu/faculty/faculty-directory/humphreys , of the University of Texas at Austin, has been warning of the coming danger of GPS spoofing for many years. In 2013, he showed how a superyacht with state-of-the-art navigation could be lured off-course by GPS spoofing. “The receiver’s behaviour in the Black Sea incident was much like during the controlled attacks http://onlinelibrary.wiley.com/doi/10.1002/navi.183/full my team conducted,” says Humphreys.
Humphreys thinks this is Russia experimenting with a new form of electronic warfare. Over the past year, GPS spoofing has been causing chaos for the receivers on phone apps in central Moscow to misbehave https://themoscowtimes.com/articles/the-kremlin-eats-gps-for-breakfast-55823 . The scale of the problem did not become apparent until people began trying to play Pokemon Go. The fake signal, which seems to centre on the Kremlin, relocates anyone nearby to Vnukovo Airport http://www.thetruthaboutcars.com/2017/01/bizarre-gps-spoofing-means-drivers-near-kremlin-always-airport/ , 32 km away. This is probably for defensive reasons; many NATO guided bombs, missiles and drones rely on GPS navigation, and successful spoofing would make it impossible for them to hit their targets.
But now the geolocation interference is being used far away from the Kremlin. Some worry that this means that spoofing is getting easier. GPS spoofing previously required considerable technical expertise. Humphreys had to build his first spoofer from scratch in 2008, but notes that it can now be done with commercial hardware and software downloaded from the Internet.
Nor does it require much power. Satellite signals are very weak – about 20 watts from 20,000 miles away – so a one-watt transmitter on a hilltop, plane or drone is enough to spoof everything out to the horizon.
If the hardware and software are becoming more accessible, nation states soon won’t be the only ones using the technology. This is within the scope of any competent hacker http://www.comsoc.org/ctn/lost-space-how-secure-future-mobile-positioning . There have not yet been any authenticated reports of criminal spoofing, but it should not be difficult for criminals to use it to divert a driverless vehicle https://www.newscientist.com/article/2142059-sneaky-attacks-trick-ais-into-seeing-or-hearing-whats-not-there/ or drone delivery, or to hijack an autonomous ship. Spoofing will give everyone affected the same location, so a hijacker would just need a short-ranged system to affect one vehicle.
But Humphreys believes that spoofing by a state operator is the more serious threat. “It affects safety-of-life operations over a large area,” he says. “In congested waters with poor weather, such as the English Channel, it would likely cause great confusion, and probably collisions.”
Last says that the Black Sea incident suggests a new device capable of causing widespread disruption, for example, if used in the ongoing dispute with Ukraine. “My gut feeling is that this is a test of a system which will be used in anger at some other time.”
73’s
webmaster
_______________________________________________Subject: Re: [Radio Officers, &c] Ships fooled in GPS spoofing attack suggest Russian cyberweapon
Ships fooled in GPS spoofing attack suggest Russian cyberweapon
News from: New Scientis (article reported by R/O Luca Milone – IZ7GEG)
https://www.newscientist.com/article/2143499-ships-fooled-in-gps-spoofing-attack-suggest-russian-cyberweapon/#.WY6zNfZq1VA.google_plusone_share https://www.newscientist.com/article/2143499-ships-fooled-in-gps-spoofing-attack-suggest-russian-cyberweapon/#.WY6zNfZq1VA.google_plusone_share
On date: 10 August 2017
By David Hambling
Reports of satellite navigation problems in the Black Sea suggest that Russia may be testing a new system for spoofing GPS, New Scientist has learned. This could be the first hint of a new form of electronic warfare available to everyone from rogue nation states to petty criminals.
On 22 June, the US Maritime Administration filed a seemingly bland incident report. The master of a ship off the Russian port of Novorossiysk had discovered his GPS put him in the wrong spot – more than 32 kilometres inland, at Gelendzhik Airport.
After checking the navigation equipment was working properly, the captain contacted other nearby ships. Their AIS traces – signals from the automatic identification system used to track vessels – placed them all at the same airport. At least 20 ships were affected http://maritime-executive.com/editorials/mass-gps-spoofing-attack-in-black-sea .
While the incident is not yet confirmed, experts think this is the first documented use of GPS misdirection – https://www.marad.dot.gov/msci/alert/2017/2017-005a-gps-interference-black-sea/ a spoofing attack that has long been warned of but never been seen in the wild.
Until now, the biggest worry for GPS has been it can be jammed https://www.newscientist.com/article/dn20202-gps-chaos-how-a-30-box-can-jam-your-life/ by masking the GPS satellite signal with noise. While this can cause chaos, it is also easy to detect. GPS receivers sound an alarm when they lose the signal due to jamming. Spoofing is more insidious: a false signal from a ground station simply confuses a satellite receiver. “Jamming just causes the receiver to die, spoofing causes the receiver to lie,” says consultant David Last http://www.professordavidlast.co.uk/ , former president of the UK’s Royal Institute of Navigation.
Todd Humphreys http://www.ae.utexas.edu/faculty/faculty-directory/humphreys , of the University of Texas at Austin, has been warning of the coming danger of GPS spoofing for many years. In 2013, he showed how a superyacht with state-of-the-art navigation could be lured off-course by GPS spoofing. “The receiver’s behaviour in the Black Sea incident was much like during the controlled attacks http://onlinelibrary.wiley.com/doi/10.1002/navi.183/full my team conducted,” says Humphreys.
Humphreys thinks this is Russia experimenting with a new form of electronic warfare. Over the past year, GPS spoofing has been causing chaos for the receivers on phone apps in central Moscow to misbehave https://themoscowtimes.com/articles/the-kremlin-eats-gps-for-breakfast-55823 . The scale of the problem did not become apparent until people began trying to play Pokemon Go. The fake signal, which seems to centre on the Kremlin, relocates anyone nearby to Vnukovo Airport http://www.thetruthaboutcars.com/2017/01/bizarre-gps-spoofing-means-drivers-near-kremlin-always-airport/ , 32 km away. This is probably for defensive reasons; many NATO guided bombs, missiles and drones rely on GPS navigation, and successful spoofing would make it impossible for them to hit their targets.
But now the geolocation interference is being used far away from the Kremlin. Some worry that this means that spoofing is getting easier. GPS spoofing previously required considerable technical expertise. Humphreys had to build his first spoofer from scratch in 2008, but notes that it can now be done with commercial hardware and software downloaded from the Internet.
Nor does it require much power. Satellite signals are very weak – about 20 watts from 20,000 miles away – so a one-watt transmitter on a hilltop, plane or drone is enough to spoof everything out to the horizon.
If the hardware and software are becoming more accessible, nation states soon won’t be the only ones using the technology. This is within the scope of any competent hacker http://www.comsoc.org/ctn/lost-space-how-secure-future-mobile-positioning . There have not yet been any authenticated reports of criminal spoofing, but it should not be difficult for criminals to use it to divert a driverless vehicle https://www.newscientist.com/article/2142059-sneaky-attacks-trick-ais-into-seeing-or-hearing-whats-not-there/ or drone delivery, or to hijack an autonomous ship. Spoofing will give everyone affected the same location, so a hijacker would just need a short-ranged system to affect one vehicle.
But Humphreys believes that spoofing by a state operator is the more serious threat. “It affects safety-of-life operations over a large area,” he says. “In congested waters with poor weather, such as the English Channel, it would likely cause great confusion, and probably collisions.”
Last says that the Black Sea incident suggests a new device capable of causing widespread disruption, for example, if used in the ongoing dispute with Ukraine. “My gut feeling is that this is a test of a system which will be used in anger at some other time.”
73’s
webmaster
YCCC Reflector mailto:***@contesting.com
Yankee Clipper Contest Club http://www.yccc.org
Reflector Info: http://lists.contesting.com/mailman/listinfo/yccc
---
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus
_______________________________________________
time-nuts mailing list -- time-***@febo.com
To unsubscribe, go to https://www.febo.com/cgi-bin/mailman/listinfo/time-nuts
and follow the instructions there.