gps forensics, crime and jamming 367 2nd gnss vulnerabilities

17
GPS Forensics, Crime and Jamming David Last (Consultant Engineer & Expert Witness) (email: [email protected] ) Satellite navigators in vehicles can now be examined using the newly developed forensic techniques outlined in this paper. So too may be the GPS-based tracking systems fitted, often covertly, to many kinds of vehicle. Both sources provide intelligence of considerable value in the detection of crime. However, the low-cost GPS jamming devices now readily available threaten tracking and security systems. The paper will describe and analyse jammers used by criminals to block GPS reception and mobile telephone communications. The implications of these developments for other GNSS systems are discussed and also the possible use of spoofers by criminals. KEY WORDS 1. GNSS 2: Forensic science 3: Jamming 4: GNSS vulnerability 1. INTRODUCTION. The most widely used of all GPS devices currently are car satellite navigators. When vehicles carrying navigators are used for criminal purposes, records contained in the devices may be examined. Such investigations rely on newly- developed forensic techniques that employ a combination of computer expertise and navigation knowledge [1]. These methods will be described briefly and illustrated by examples of the valuable intelligence they can provide for crime investigators.

Upload: lamthuy

Post on 14-Feb-2017

223 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: GPS Forensics, Crime and Jamming 367 2nd GNSS Vulnerabilities

GPS Forensics, Crime and Jamming

David Last (Consultant Engineer & Expert Witness)

(email: [email protected])

Satellite navigators in vehicles can now be examined using the newly developed

forensic techniques outlined in this paper. So too may be the GPS-based tracking

systems fitted, often covertly, to many kinds of vehicle. Both sources provide

intelligence of considerable value in the detection of crime. However, the low-cost

GPS jamming devices now readily available threaten tracking and security systems.

The paper will describe and analyse jammers used by criminals to block GPS

reception and mobile telephone communications. The implications of these

developments for other GNSS systems are discussed and also the possible use of

spoofers by criminals.

KEY WORDS

1. GNSS 2: Forensic science 3: Jamming 4: GNSS vulnerability

1. INTRODUCTION. The most widely used of all GPS devices currently are car

satellite navigators. When vehicles carrying navigators are used for criminal purposes,

records contained in the devices may be examined. Such investigations rely on newly-

developed forensic techniques that employ a combination of computer expertise and

navigation knowledge [1]. These methods will be described briefly and illustrated by

examples of the valuable intelligence they can provide for crime investigators.

Page 2: GPS Forensics, Crime and Jamming 367 2nd GNSS Vulnerabilities

2

Of even greater value can be the evidence from the GPS-based tracking systems now

fitted to an increasingly-wide range of vehicles. These installations, many of which

are covert, provide a history of a vehicle’s movements. Tracking records from such

systems can be analysed forensically to provide evidence of considerable value in the

detection of crime.

Whilst the principal purpose of vehicle tracking systems is generally to provide real-

time information that enhances the efficient control of fleets of vehicles, they also

have an important security function. By continuously displaying up-to-date location

information, and allowing vehicles that deviate from planned routes or cross specific

boundaries to be identified, they play a key role in the protection of assets that include

the vehicles themselves and their high-value contents. Vehicle tracking systems are

now among the most important applications of GPS for our society.

The recent appearance of readily availability, low-cost, GPS jamming devices

presents a real and immediate threat to all such tracking and security systems.

Criminals are now employing jammers that can block both GPS reception and GSM

mobile communications. These render vulnerable the use of GPS for critical security

applications. It is also likely that other global satellite navigation systems (GNSS)

now being developed will share that vulnerability. In addition, whilst they are not yet

being deployed for criminal purposes, spoofers that mimic GNSS signals will pose an

even greater threat for vehicle security than do jammers.

Page 3: GPS Forensics, Crime and Jamming 367 2nd GNSS Vulnerabilities

3

There are alternatives to the use of GNSS for vehicle navigation and tracking which

are not vulnerable to these threats. Such alternative technologies promise a degree of

protection to vehicle tracking and recovery systems. They include the use of

Enhanced Loran (eLoran). These solutions are likely to play an increasing role as the

use of GNSS jamming and spoofing increases.

2. ANALYSIS OF VEHICLE SATELLITE NAVIGATORS. Vehicles satellite

navigators, currently the most numerous of GPS devices, often contain large numbers

of records created by their users. These may show where they have been, how they

got there, and a great deal more of value to crime investigators.

The destinations stored in car navigators can be extracted, listed and plotted (see

Figure 1). It is now possible to do this for virtually all makes and models of device,

including the ones built into vehicles. These examinations must be conducted with

great care. It is important to maintain very high forensic standards if the evidence is to

stand up in court. And it is also essential to preserve that evidence. For that reason,

receivers must be screened from incoming satellite signals during the examination;

this can be very difficult to achieve given the exceptionally high sensitivity of current

GPS receivers!

Some car navigators disclose a great deal of information: who owns them; multiple

addresses; a home address plus favourite addresses; those destinations visited most

frequently or most recently; the language spoken by the user and many other

preferences; whether the user travels abroad; and occasionally telephone calls made

Page 4: GPS Forensics, Crime and Jamming 367 2nd GNSS Vulnerabilities

4

and received. Some units even contain a detailed record of journeys stretching back

over months, each point timed and dated (Figure 2). These can provide compelling

evidence of criminal activity.

3. TRACKING SYSTEMS. Probably the most impressive forensic evidence

involving GPS comes from the vehicle tracking systems now fitted to increasing

numbers of trucks, trailers, delivery vans and hire cars. Each vehicle carries a GPS

receiver that makes measurements of its location. These are sent at intervals to a

Tracking Centre. The communications most employ the mobile phone data services,

GPRS or 3G. At the Tracking Centre the data may be stored, processed, and

displayed on a map. An alarm can be raised if a high-value load deviates from its

planned route or if a hire car is about to be exported illegally. Many of these tracking

installations are covert and very difficult to discover.

When the police seize a tracking record, a forensic expert must audit the data in the

various ways I have shown in blue in Figure 3. These focus on the many parts of the

system the Tracking Company does not control. Tracking companies generally do not

check the quality and accuracy of GPS at the time, and in the place, of a crime. A

navigation professional, accustomed to dealing with high integrity safety-of-life

systems can bring valuable experience to examining tracking records.

It is also often necessary to estimate the accuracy of GPS fixes. Doing so may require

the analysis of complex situations. An example would be the GPS receiver in a covert

tracking system, with its antenna hidden deep inside the vehicle, perhaps behind the

Page 5: GPS Forensics, Crime and Jamming 367 2nd GNSS Vulnerabilities

5

dashboard. The vehicle itself might be surrounded by tall buildings that block and

reflect satellite signals. This is a novel and fascinating area where Navigation and

Forensic Science meet!

4. GPS JAMMING. Recently, something the navigation community has long

discussed has appeared, and is spreading, in the world of crime: GPS jamming

devices are being used by criminals to overcome tracking systems in order to steal

vehicles. The jammers are low-powered transmitters that can block GPS reception in

the vicinity of a vehicle. Jammers of the kind shown in Figure 4 are readily available

from multiple sources on the Internet and typically cost only €100.

The principal reason that GNSS signals are so easy to jam is that the satellites

transmit no more power than a car headlight, yet must illuminate nearly half the

earth’s surface, from 20,000km out in space. The signals that reach a GNSS receiver

are easily swamped by even a thousandth of a watt of jamming signal radiated close

by.

Figure 5 shows the spectrum of the signal radiated by the low-powered jammer in

Figure 4, plotted across a 100MHz frequency range centred on the GPS L1 frequency

at 1575.42MHz. The total power this jammer radiates is only about one tenth of a

milliwatt. Yet that is sufficient to block commercial GPS receivers over a few metres

range, which is what the criminals want.

Page 6: GPS Forensics, Crime and Jamming 367 2nd GNSS Vulnerabilities

6

5. GPS AND MOBILE PHONE JAMMERS. If a vehicle is to be completely

screened from electronic tracking, not only must GPS be disabled in its vicinity, so

must mobile phones as well. If not, they can be used to call for assistance and they

can also be tracked using cell-site analysis methods. To prevent that, a jammer such

as the one shown in Figure 6, can be employed. It blocks not only GPS reception but

also that of GSM (Global System for Mobile Communications), DCS (Digital

Cellular System) and 3G (Third Generation) mobile phones. The spectra of the GPS

jamming signal this device radiates are designed to cover the frequency bands in

which the 900MHz, 1800MHz and 3G jamming base stations transmit, so preventing

mobiles from receiving them and establishing communications.

Recently, much more powerful jammers have appeared on the market (Figure 7).

These radiate approximately 2W on each frequency, a power level some 20,000 times

greater than that of the low-powered jammer in Figure 4. These jammers are more

powerful than the transmitter employed recently in official UK tests into the effects

on shipping of jamming GPS over a sector of the North Sea up to 30km from the

jammer [2]. Thus, a 2W jammer could cause interference over a substantial area.

8. OTHER GNSS. The spectrum, shown in Figure 5, of the jamming signal of the

simple low-power device shown in Figure 4 extends from approximately 1563MHz to

1600MHz. Towards the centre of this band is the civil GPS signal, approximately

2MHz wide. The jammer also covers the 20MHz-wide military P/Y signal, the yellow

block.

Page 7: GPS Forensics, Crime and Jamming 367 2nd GNSS Vulnerabilities

7

The slightly wider blue block represents the L1 signals planned for Galileo. So this

device would serve as a Galileo jammer, too. Its spectrum is not wide enough to cover

more than the low-frequency end of the GLONASS band, shown in purple. But with a

small extension of bandwidth it would jam GLONASS as well.

In discussions on vulnerability it is often argued that, since Galileo will use more than

one frequency band, simply jamming L1 would not prevent Galileo reception.

However, Figure 8 shows a jammer that has recently come onto the market. It has two

transmissions: one covers the L1 frequency band; the other, at a higher power, covers

the L2 band. There is no L5 transmission, but adding that would be trivial. These are

the frequency bands in which the world’s present and planned GNSS systems operate,

including Galileo.

The jammers presented in this paper are relatively simple and crude devices. But they

are highly effective in preventing the operation of civil GPS receivers. They are

readily available and are certainly being sold and being used. They render our GNSS-

based security systems vulnerable to attack.

More seriously still, I believe that it is now technically feasible, though apparently not

yet within the capabilities of criminals, to spoof GPS. When that happens, it will

allow criminals to hi-jack and divert a vehicle whilst the tracking system shows it still

following its planned route - so no alarm will be raised. Vehicles will also be able to

avoid purely GNSS-based road user pricing systems.

Page 8: GPS Forensics, Crime and Jamming 367 2nd GNSS Vulnerabilities

8

8. MITIGATING JAMMING & SPOOFING. All is not lost! In many countries

vehicle tracking systems are deployed that do not depend on GNSS. An example is

Datatrak [3]. There are also vehicle recovery systems such as Tracker with its LoJack

technology installed in police cars and helicopters [4]. These systems are immune to

GNSS jamming and spoofing. Of course, like all radio systems, they can be jammed.

But they are orders of magnitude less vulnerable than GNSS and jammers that

targeted them would be easier to detect.

Another way to mitigate GNSS jamming is to use dead-reckoning. Many cars with

built-in navigators are fitted with heading sensors and wheel-rotation counters to cope

with losses of GPS in tunnels and urban canyons. They are immune to jamming, at

least for short periods and distances. But they would not necessarily be immune to

GNSS spoofing.

A complete alternative navigation technology also exists: Enhanced Loran, or eLoran

[5]. Built into a GNSS receiver, it can take over seamlessly when GNSS is jammed. It

can also replace the exceptionally-precise GPS timing that currently keeps most of

our telecommunications systems and the Internet running. There is currently great

interest in this cost-effective insurance policy worldwide.

9. CONCLUSIONS. The legal and forensic aspects of GNSS are growing ever more

important and their role more vital and more successful in reducing crime. But it is

essential that we plan our responses to the vulnerability of our current and future

GNSS-based security systems, which are now under attack. It is important that

Page 9: GPS Forensics, Crime and Jamming 367 2nd GNSS Vulnerabilities

9

conferences such as this one on GNSS Vulnerabilities and Solutions recognise these

threats and encourage open and full discussion of them and of solutions to the dangers

they pose.

REFERENCES

[1] Last, J.D. (2009), Silent Witness, Navigation News, pp10-13, January/February

2009 (http://www.professordavidlast.co.uk/cms_items/f20090402085322.pdf)

[2] Grant, A.J et al (2009). GPS Jamming and the Impact on Maritime Navigation.

Journal of the Royal Institute of Navigation, 62, pp173-187, April 2009. (www.gla-

rrnav.org/pdfs/GPS_Jamming_and_the_impact_on_maritime_navigation.pdf)

[3] http://www.datatrak.ws/contactus_generalinfo.asp

[4] http://www.lojack.com/

[5] Last, J.D. (2009). The Key to eNavigation. Navigation News, pp11-13, May/June

2009 (http://www.professordavidlast.co.uk/cms_items/f20090615113227.pdf)

Page 10: GPS Forensics, Crime and Jamming 367 2nd GNSS Vulnerabilities

10

FIGURES

(a)

(b)

Figure 1: (a) addresses of destinations listed, (b) addresses plotted

Page 11: GPS Forensics, Crime and Jamming 367 2nd GNSS Vulnerabilities

11

Figure 2: Detailed tracks of routes travelled by a vehicle, each point dated and timed

Page 12: GPS Forensics, Crime and Jamming 367 2nd GNSS Vulnerabilities

12

Figure 3: Vehicle tracking system with checks (in blue) to establish quality of evidence

Page 13: GPS Forensics, Crime and Jamming 367 2nd GNSS Vulnerabilities

13

Figure 4: Low-powered GPS jammer

Page 14: GPS Forensics, Crime and Jamming 367 2nd GNSS Vulnerabilities

14

Figure 5: Spectrum of signal radiated by low-powered GPS jammer

Page 15: GPS Forensics, Crime and Jamming 367 2nd GNSS Vulnerabilities

15

Figure 6: Jammer for GPS, plus the GSM (900MHz), DCS (1800MHz) and 3G mobile

telephone bands.

Page 16: GPS Forensics, Crime and Jamming 367 2nd GNSS Vulnerabilities

16

Figure 7: High powered jammer for GPS and mobile phone bands

Page 17: GPS Forensics, Crime and Jamming 367 2nd GNSS Vulnerabilities

17

Figure 8: Jammer for L1 and L2 frequency bands