Feeds

BAE proposes GPS-less location

Beat the jammers and spoofs

Internet Security Threat Report 2014

Whether or not Iran used GPS spoofing to down a US drone last year, there’s no doubt that GPS spoofing is both real and easier than the military would like. Now, BAE Systems is proposing a positioning technology that works without GPS.

The defence company says its NAVSOP system – Navigation via Signals of Oppurtunity – allows devices to calculate position based on the mass of signals that already surround us.

This, the company says, makes NAVSOP resistant both to GPS jamming, and to spoofing attacks of the kind recently demonstrated by Todd Humphreys (University of Texas, Austin, press release here). In that attack, Humphreys demonstrated a drone takeover using about $1,000 of kit.

By using available signals – from mobile phone towers, fixed broadcast locations like TV and radio, air traffic control radars, and where location data is available, WiFi routers – BAE Systems claims its proposed system isn’t subject to the problems that face GPS navigation.

As NewScientist explains, the company says the heavy regulation applied to signals like broadcasts, radio and radar means both their frequency and the signal strength at the transmitter are known.

That makes them suitable for location calculation by triangulation – and the variety of regulated transmitters means that each signal source can be used to correct errors in others. For example, while mobile base station locations are regulated, it’s not unknown for carriers to move a rooftop base station by a few meters without updating the public record.

By taking advantage of lower-frequency signals that penetrate the mass of concrete of a city location – something that causes problems for GPS – BAE says it can also provide a location fix where GPS units lose sight of their satellites.

BAE notes that the public infrastructure required already exists – so NAVSOP can be rolled out without an expensive build. BAE’s announcement is here. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Antarctic ice THICKER than first feared – penguin-bot boffins
Robo-sub scans freezing waters, rocks warming models
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Your PHONE is slowly KILLING YOU
Doctors find new Digitillnesses - 'text neck' and 'telepressure'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
NASA launches new climate model at SC14
75 days of supercomputing later ...
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.