recommended reading

GPS Jammers Could Knock Out Signals in a Medium-Sized City

Candy Welz/AP

A single well-placed GPS jammer or spoofer could disrupt signals in an entire region of the United States, an official from the Homeland Security Department told a GPS conference in Nashville, Tenn.

At the same time, the U.S. still “lacks the capability to rapidly detect and geo-locate jamming or spoofing of GPS services,” DHS program manager John Merrill told the annual meeting of the Civil Global Positioning System Service Interface Committee, a global forum that fosters interaction between the U.S. and worldwide GPS users. The U.S. developed and operates GPS.

Merrill did not define the size of a region a GPS jammer could knock out, but Jules McNeff, who spent 20 years in the Air Force working on GPS and is now vice president for strategies and programs at Overlook Systems Technologies Inc., a GPS engineering firm in Vienna, Va.,estimated a one watt GPS jammer could blanket a medium sized city.

Logan Scott, president of a company with GPS expertise called LS Consulting, said in a May webinar run by Inside GNSS that a GPS jammer with one-tenth of a watt of transmit power has a range of 9.4 miles, a one watt jammer, 29.8 miles, and a fen watt jammer, 94.2 miles. Inside GNSS is a magazine on GPS and other satellite navigation systems operated by China, the European Union and Russia, collectively called Global Navigation Satellite Systems.

Consumer jammers at these power levels can be purchased on the Internet primarily from Chinese manufacturers at prices as low as $40.

DHS and the Defense Department have worked to develop a jammer location system that picks up and feeds jammer signals to a master station run by the National Geo-Spatial Intelligence Agency since 2010, but to date the only feeds it receives are from sensors located at Newark Liberty International Airport in New Jersey, Merrill told the conference.

The Federal Aviation Administration and the Federal Communications Commission spent two years -- from March 2009 to April 2011 -- locating just one GPS jammer used on the New Jersey Turnpike. That jammer interfered with an FAA system that provides enhanced navigation signals to aircraft in the vicinity of the airport for precision approach, departure procedures and terminal area operations.

McNeff called the jammer location system a “concept,” not an operational countrywide system.

The FAA plans to place heavy reliance on GPS between now and 2030, with the satellite system as the core of its Next Generation Air Transportation System, and plans to decommission its ground based VHF omnidirectional radio, or VOR, by then.

Jammers can affect GPS as well as other GNSS systems. In September 2012, the FAA set up a GNSS Intentional Interference and Spoofing Study Team to “identify technical, political, legal, and operational ways to mitigate the impact of GPS spoofing and jamming.” 

Deborah Lawrence, manager of FAA's navigation programs, told the conference that the study team will, by the end of September, provide the agency with “specific, actionable recommendations” on how to counteract spoofing and jamming.

--

Explore the future of technology in government at Nextgov PrimeOct. 15-16 in Washington. Registration for federal employees is free.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download

When you download a report, your information may be shared with the underwriters of that document.