Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Spoofing attack
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Russian GPS spoofing=== {{also|Krasukha#Operational_history|Borisoglebsk-2|Automatic Dependent Surveillance–Broadcast}} In June 2017, approximately twenty ships in the [[Black Sea]] complained of GPS anomalies, showing vessels to be transpositioned miles from their actual location, in what Professor Todd Humphreys believed was most likely a spoofing attack.<ref name="NRK"/><ref>{{cite news |url=http://maritime-executive.com/editorials/mass-gps-spoofing-attack-in-black-sea |publisher=The Maritime Executive |title=Mass GPS Spoofing Attack in Black Sea? |first=Dana A. |last=Goward |date=July 11, 2017 |quote=An apparent mass and blatant, GPS spoofing attack involving over 20 vessels in the Black Sea last month has navigation experts and maritime executives scratching their heads.}}</ref> GPS anomalies around [[Putin's Palace]] and the [[Moscow Kremlin]], demonstrated in 2017 by a Norwegian journalist on air, have led researchers to believe that Russian authorities use GPS spoofing wherever [[Vladimir Putin]] is located.<ref name="NRK"/><ref>{{cite news |url=https://www.youtube.com/watch?v=dfLE_nXh7jY |publisher=[[YouTube]] |author=Norwegian Broadcasting Corporation |author-link=Norwegian Broadcasting Corporation |title=Moscow correspondent Morten Jentoft shows GPS trouble near Kremlin |access-date=September 25, 2017 |date=September 14, 2017}}</ref> The mobile systems named [[Borisoglebsk-2]], [[Krasukha]] and [[Zhitel]] are reported to be able to spoof GPS.<ref name="sce">{{cite news |last1=Cranny-Evans |first1=Samuel |title=Russia trials new EW tactics |url=https://www.janes.com/defence-news/news-detail/russia-trials-new-ew-tactics |publisher=Janes.com |date=14 June 2019}}</ref> Incidents involving Russian GPS spoofing include during a November 2018 NATO exercise in Finland that led to ship collision (unconfirmed by authorities).<ref name=bbcfin>{{cite news|url=https://www.bbc.com/news/world-europe-46178940|title=Russia suspected of jamming GPS signal in Finland|last=|work=BBC News|date=12 November 2018|access-date=28 December 2019|via=BBC}}</ref> and a 2019 incident of spoofing from Syria by the Russian military that affected the civil airport in [[Tel Aviv]].<ref>{{cite web|url=https://www.timesofisrael.com/disruption-of-gps-systems-at-ben-gurion-airport-resolved-after-2-months/|title=Disruption of GPS systems at Ben Gurion Airport resolved after 2 months|last=Times Of Israel|date=5 August 2019|access-date=29 December 2019|via=Times of Israel}}</ref><ref name="jp19">{{cite news |last1=JOFFRE |first1=TZVI |last2=BOB |first2=YONAH JEREMY |title=MI6 fears Iran used Russian GPS tech to send UK tanker off course - report |url=https://www.jpost.com/middle-east/mi6-fears-iran-used-russian-gps-tech-to-send-uk-tanker-off-course-report-596535 |publisher=The Jerusalem Post |date=23 July 2019}}</ref> In December of 2022 significant GPS interference in several Russian cities was reported by the [[GPSJam]] service; the interference was attributed to defensive measures taken by Russian authorities in the wake of the invasion of Ukraine.<ref name=mbgps>{{Cite magazine |last=Burgess |first=Matt |title=GPS Signals Are Being Disrupted in Russian Cities |language=en-US |magazine=Wired |url=https://www.wired.com/story/gps-jamming-interference-russia-ukraine/ |date=15 December 2022 |issn=1059-1028}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)