
Expert Advice: The Low Cost of Protecting America
January 1, 2014
By Dana A. Goward Highly precise and free for use by anyone with an inexpensive receiver, GPS and […]
Read More
By Dana A. Goward Highly precise and free for use by anyone with an inexpensive receiver, GPS and […]
On August 30, QinetiQ and Rockwell Collins demonstrated the first joint satellite navigation positioning using live signals from […]
Spirent Communications, a navigation and positioning systems testing company, has teamed up with Qascom, an expert in GNSS […]
GPS Source announced today that GLI-FLO has been granted security approval by the U.S. Air Force Global Positioning […]
It’s a hostile (electronic) world out there, people. Our wired and radio-based communication systems are constantly under attack from evil doers. We are all familiar with computer viruses and worms hiding in malicious software or malware distributed over the Internet or by infected USB flash drives. Trojan horses are particularly insidious. These are programs concealing harmful code that can lead to many undesirable effects such as deleting a user’s files or installing additional harmful software. Such programs pass themselves off as benign, just like the “gift” the Greeks delivered to the Trojans as reported in Virgil’s Aeneid. This was a very early example of spoofing.
An ITT Exelis product that detects and locates GPS interference sources in 3-D by using longitude, latitude and […]
By Daniel Shepard, Jahshan A. Bhatti, and Todd E. Humphreys Unmanned aerial vehicle (uav) used in the […]
Spoofing tests against phasor measurement units demonstrate their vulnerability to attack. A generator trip in an automatic control scheme could be falsely activated by the GPS spoofing, possibly leading to cascading faults and a large-scale power blackout.
Follow Us