Originally posted by AtW
View Post
The Vulnerability Assessment Team at Los Alamos National Laboratory has demonstrated the ease with which civilian GPS spoofing attacks can be implemented. This spoofing is most easily accomplished by using a GPS satellite simulator. Such simulators are uncontrolled and widely available.
How easy spoofing navigation messages on top of P(Y) code is hard to say, it depends on whether they are applied to the P code before encryption (I would hope so), but if they weren't then I think that it's enough to be able to recover a version of the encrypted P(Y) code unmodulated with navigation messages which would probably be possible with access to a captured receiver or might even be possible without one if the navigation messages are the same as the civilian ones. You would need to crunch through quite a bit of data but I think it's doable.
Of course it's also possible that you could just jam the P(Y) code and cause the receiver to fall back to the civilian code which is easy to spoof.
Comment