top of page

JAMMING AND SPOOFING

GPS/GNSS jamming and spoofing are increasing worldwide and are no longer a niche risk: they disrupt navigation and timing services that modern shipping, energy grids, telecoms and military systems depend on, causing safety, financial and national-security consequences. Regulators and operators are accelerating mitigation, but many organizations remain exposed.

JAMMING ILLUSTRATION_edited.png
JAMMING ILLUSTRATION.jpg

Jamming is the deliberate transmission of radio-frequency (RF) energy to disrupt or deny legitimate signals. In the context of satellite navigation (GNSS/GPS), jamming overwhelms the very weak signals received from satellites with stronger noise or interference, making receivers unable to calculate position, velocity, or time.

​
How it works:
  • GNSS satellites transmit extremely low-power signals by the time they reach Earth.

  • A jammer transmits noise or a competing signal on the same frequencies (for example, the L1 band).

  • The receiver’s signal-to-noise ratio collapses.

  • Result: the receiver either loses lock, reports no position, or switches into degraded or fallback modes.

​

Importantly, jamming does not fake data—it simply prevents the receiver from working. This distinguishes it from spoofing, which manipulates the receiver with false but believable signals.

Spoofing is the deliberate transmission of false but valid-looking GNSS signals that deceive a receiver into calculating an incorrect position, velocity, or time—while the receiver believes everything is normal. Unlike jamming, spoofing does not deny service; it corrupts it silently.

​

How spoofing works:

  • A spoofer generates GNSS-like signals that mimic real satellites (same frequencies, codes, and structure).

  • These counterfeit signals are transmitted at slightly higher power than the genuine satellite signals.

  • The receiver locks onto the stronger, fake signals.

  • The spoofer gradually shifts the false solution—moving position, altering time, or changing velocity—without triggering alarms.

​

This “carry-off” approach is particularly dangerous because it avoids sudden jumps that operators or systems might notice.

In professional practice, spoofing is widely regarded as the more serious threat.

SPOOFING ILLUSTRATION.jpg

©2020 by SGM.

bottom of page