GNSS Security and Cybersecurity: What are the Parallels?
In 2013, the London Stock exchange was periodically affected by a jammed Global Positioning System is a navigation satellite system. See also signal. The jamming was not thought to be malicious, but the result of a local driver using an off-the-shelf jammer to elude his employer’s tracking.2 But what if a more sophisticated user with bad intentions uses a small software-defined radio plugged into their car cigarette lighter to conduct a complex timing attacking on a stock exchange? In today’s world of high-speed stock trades, millions of dollars can quickly be lost if timestamps are corrupted and panic sets in.
What do these two cases have in common? Both involve situations where attackers can exploit holes in an organization’s data capabilities to disrupt operations. Cybersecurity is a popular topic in the news today, but Position, Navigation, and Timing (Position, Navigation, and Timing: PNT and map data combine to create the GPS service.) security does not get the same attention. But like cyberattacks, attacks against GPS or other global navigation satellite system (Global navigation satellite system (GNSS): A general term describing any satellite constellation that provides positioning, navigation, and timing (PNT) services on a global or regional basis. See also) systems can have profound and damaging effects on critical infrastructure, financial institutions, and military capabilities.
In network security, the Confidentially, Integrity, and Availability (CIA) Triad3 is a model for understanding how a computer network can be exploited, and from that a defense-in-depth strategy created. Like computer networks, systems that rely on PNT data have Integrity and Availability requirements and face increasingly complex spoofing and jamming attacks. Like computer networks, PNT-reliant mission critical systems need a defense-in-depth strategy to defeat a GNSS disruption.
In computer networks, we use a tailored combination of firewalls, routers, VPNs, detection systems, and analysis engines among others to detect, protect from, and mitigate cyberattacks. And now there is an assortment of complementary PNT technologies that provide the same layered defense for GNSS. Anti-jam antennas provide additional signal integrity and availability in jamming and spoofing situations. Encrypted signals such as GPS SAASM, Satelles’ Satellite Time and Location (STL) service, and Galileo’s publicly regulated navigation provide additional signal integrity. Jamming and spoofing detection algorithms like Broadshield allow the PNT system to fall back on backup technologies such as precision timing oscillators and coupled inertial navigation systems, which maintain a stream of PNT data during the GNSS outage.
Today, GNSS security must be considered alongside cybersecurity when designing critical systems and infrastructure. The increasing reliance on GNSS for the functioning of our markets, utilities, transportation, and militaries make this an absolute requirement to protect against malicious actors across the world stage. The good news is that this is not a new type of problem. Lessons and ideas learned from securing computer networks provide applicable frameworks for securing PNT-consuming systems. There is no need to reinvent the wheel. By adapting the cybersecurity approach and incorporating available technologies, you can ensure your critical systems survive a GNSS attack. Please visit www.spectracom.com if you want to learn more about exciting innovative technologies we offer to help protect your critical systems and infrastructure from today’s GNSS dangers.
1 Acharya, S. (2016, February 26). Ukraine power outages caused by cyberattacks affected 225,000 customers, says US [Web log post]. Retrieved from
2 The Economist. (2015, July 27). Out of sight. The Economist. Retrieved from
3 Perrin, C. (2001, June 30). The CIA triad. [Web log post].
Retrieved from https://www.techrepublic.com/blog/it-security/the-cia-triad/ .
Jon Sinden has over 16 years of experience designing, selling and implementing advanced networking communications and position, navigation and timing (PNT) systems for government and military organizations throughout the world. Jon also draws on 22 years of operational experience as a Field Artillery and Information Operations officer in the United States Army. He holds a BS in Electrical Engineering from Rochester Institute of Technology and Masters of Strategic Leadership and Masters of Strategic Marketing degrees from Roberts Wesleyan College.