Blogs

Thought leadership from in-house experts

Blogs

Blog

What is GPS/GNSS Spoofing?

July 2, 2025

Will Thornton

spirent spoofing detection service
Spoofing has been a concern in the defense space for many years, but has started to have significant impacts on civil applications around the world. But what is spoofing? Why is it happening? And how can you protect your systems?

GPS/GNSS spoofing is a category of deliberate attacks on GNSS receivers. Rather than blocking signals entirely (as in jamming), spoofing aims to manipulate a receiver’s calculations, causing it to determine an incorrect position, time, or velocity without detecting a problem. In effect, spoofing tricks a system into navigating or operating based on false information.

Spoofing is a growing concern because modern society heavily depends on satellite-derived positioning, navigation, and timing (PNT). Aircraft, ships, vehicles, financial networks, power grids, and critical infrastructure increasingly rely on GNSS. Successful spoofing can cause widespread disruption, and because spoofed receivers continue functioning under false information, the danger is often invisible until significant damage occurs.

How Spoofing Works: Two Main Attack Types

Spoofing attacks generally fall into two categories:

Both types of spoofing exploit the trust that navigation systems place in GNSS signals and related data streams. Successful spoofing can be subtle and highly targeted, making detection extremely challenging.

Why Spoofing Could Be Used

Spoofing attacks could be used for many reasons, ranging from criminal intent to national security operations:

As access to spoofing technologies becomes easier and cheaper, the threat landscape is expanding.

Spoofing vs. Jamming: Critical Differences

While both spoofing and jamming are forms of RF interference, they differ fundamentally:

Because successful spoofing attacks often will not trigger alarms or generate obvious symptoms, and do not need power levels to be as high as a GNSS jammer, they are considered stealthier and potentially more damaging than jamming.

How to Counter GNSS Spoofing

Defending against GNSS spoofing requires a layered and adaptive approach. Some common strategies include:

No single solution is foolproof. Building resilient navigation systems typically requires combining several of these techniques, along with regular testing and updates to keep pace with evolving spoofing tactics.

The Importance of Realistic Testing

Spoofing is no longer a hypothetical problem—it is an active, evolving threat to modern navigation and PNT systems. Understanding spoofing techniques and building resilience is critical across defense, aviation, maritime, and commercial sectors.

The only way to continuously evaluate and improve spoofing defenses is through in-field and realistic lab-based testing. Controlled spoofing simulations in a laboratory environment allow organizations to test systems safely against sophisticated attacks, refine detection capabilities, and ensure operational readiness without risking real-world disruption.

Spirent has decades of experience helping organizations test and harden systems against GNSS spoofing and other forms of RF interference. Talk to us to learn how advanced simulation can help you stay ahead in an increasingly contested navigation environment.

 

@2021 Spirent Federal Systems, Inc.
Office: (801) 785-1448
Customer Support: (801) 785-1275
Email: info@spirentfederal.com
Website Issue Reporting: webmaster@spirentfederal.com