GPS Interference and Spoofing in Indian Airspace

  • 23 Mar 2025

In News:

Between November 2023 and February 2025, 465 incidents of GPS interference and spoofing were reported, predominantly in the Amritsar and Jammu border regions. This was disclosed by Minister of State for Civil Aviation MurlidharMohol in a written reply to the Lok Sabha.

What is GPS/GNSS Spoofing?

  • GPS (Global Positioning System) and GNSS (Global Navigation Satellite System) spoofing involves broadcasting false GPS signals that deceive receivers into calculating incorrect locations.
  • It is a form of cyberattack exploiting weak satellite signal strength to override legitimate GPS data.
  • It can mislead aircraft navigation systems, creating flight safety risks in sensitive regions like international borders.

How GPS Spoofing Works:

  1. GPS satellites transmit weak signals to Earth.
  2. Spoofers broadcast stronger fake signals mimicking these satellites.
  3. Receivers (like those in aircraft) pick up false data, resulting in mislocation or navigation errors.

Types of Spoofing Attacks:

  • GPS Spoofing – False location data.
  • IP Spoofing – Hides origin of data, often used in DDoS attacks.
  • SMS/Caller ID Spoofing – Disguises identity to deceive users.

Government Response:

DGCA Circular (Nov 2023):

  • Mandated reporting of GPS interference.
  • Issued mitigation guidelines for:
    • Aircraft operators
    • Pilots
    • Air Traffic Controllers
    • Air Navigation Service Providers (ANSP)

Use of International Best Practices:

  • Guidelines align with ICAO and EASA standards.
  • NOTAMs (Notice to Airmen) are issued in affected areas.
  • Airlines implement Standard Operating Procedures (SOPs) to manage spoofing incidents.

Navigation Redundancy Measures:

  • Retention of ground-based navigation systems as backups.
  • Ensures continued navigation in the event of GPS disruption.

Role of AAI (Airports Authority of India):

  • Sole Air Navigation Service Provider (ANSP) in India.
  • Continuously upgrading air navigation infrastructure to counter emerging threats like spoofing.