FAQ

GPS Spoofing Aircraft Protection: Frequently Asked Questions for Airlines and Flight Operations

GPS spoofing — the transmission of false GPS signals to mislead aircraft navigation systems — has emerged as one of the most significant and persistent threats to civil aviation safety in the Middle East, Baltic, and Black Sea regions. Since 2023, thousands of aviation incidents have been reported in which aircraft have experienced GPS interference leading to position errors, false terrain warnings, navigation system disconnections, and ATC coordination challenges. While GPS spoofing is primarily a state-sponsored activity (Russian jamming and spoofing is the most attributed source in the Baltic and Black Sea), the cybersecurity and operational dimensions of the threat require coordinated responses from airlines, flight operations teams, and regulatory authorities.

Over 1,000 GPS spoofing incidents were reported in 2023 alone — affecting aircraft across Middle East, Black Sea, and Baltic regions with false position data and navigation disruptions.

How GPS Spoofing Works and Why It Affects Aircraft

GPS works by receiving signals from satellites and calculating position from signal timing. Spoofing transmits false GPS signals that are stronger than genuine satellite signals, causing receivers to calculate an incorrect position. For aircraft:

  • Navigation system errors: FMS and navigation displays show incorrect aircraft position — in severe cases, hundreds of miles from actual position
  • False terrain warnings: EGPWS/TAWS systems generate false warnings based on incorrect GPS position — creating nuisance alerts that can distract crews
  • Clock errors: GPS spoofing can introduce time errors affecting aircraft clock systems, with downstream effects on navigation and communications
  • ADS-B position corruption: Aircraft transmit incorrect position to ATC via ADS-B based on spoofed GPS data — causing ATC situational awareness problems
  • IRS update errors: Aircraft that use GPS to update Inertial Reference Systems may accumulate navigation errors as IRS is updated with incorrect GPS data

Regions Affected by GPS Spoofing

GPS spoofing incidents have been concentrated in specific geographic regions:

  • Middle East: Iraq, Iran, Syria, Lebanon, and eastern Mediterranean — significant spoofing activity related to regional conflicts and Israeli defence activities
  • Black Sea: Significant spoofing attributed to Russian military activities — aircraft operating in or near Ukrainian and Russian airspace
  • Baltic Sea: Spoofing attributed to Russian activities — affecting aircraft flying over Finland, Estonia, Latvia, Lithuania, and adjacent airspace
  • GPS-denied zones: Some restricted airspace where GPS is known to be unreliable — pilots should check NOTAMs before entering affected regions

Frequently Asked Questions

Can aircraft navigation systems detect GPS spoofing?

Standard GPS receivers in aircraft cannot distinguish genuine GPS signals from well-crafted spoofing signals — this is a fundamental limitation of GPS technology. Some indicators that spoofing may be occurring include: GPS position inconsistent with IRS-computed position; excessive GPS position accuracy figures that are implausibly good; sudden large position jumps; false EGPWS terrain warnings when the aircraft is in cruise over flat terrain; and ATC advising of position discrepancy. Avionics manufacturers and regulators are developing anti-spoofing measures, but widespread implementation will take years.

What should flight crews do if GPS spoofing is suspected?

When GPS spoofing is suspected: cross-check GPS position with IRS-computed position and ATC radar position; if significant discrepancy exists, disable GPS updates to the IRS and revert to IRS navigation; inform ATC of potential GPS degradation; cross-check position using conventional navigation aids (VOR, DME) where available; follow operator procedures for GPS-degraded navigation; and complete a safety report after landing. EASA and the CAA have published guidance materials on GPS interference procedures — operators should ensure these are incorporated into flight crew training.

Is GPS spoofing a cybersecurity threat or an aviation safety threat?

GPS spoofing is both — it is a cyber threat (electronic attack on navigation systems) with direct aviation safety implications. From a cybersecurity perspective, it is an attack on avionics systems using electronic means. From an aviation safety perspective, it creates navigation reliability risks and potentially incorrect ATC situational awareness. This dual nature means it falls within EASA Part-IS information security requirements (as a threat to aviation information systems) as well as traditional aviation safety management. Airlines should include GPS spoofing in both their ISMS risk assessment and their Safety Management System hazard register.

Can airlines change routing to avoid GPS spoofing regions?

Yes — route planning to avoid known high-spoofing regions is a practical mitigation. Some airlines operating in the Middle East and between Europe and Asia have modified routing to reduce exposure to the most active spoofing zones. However, commercial pressures, slot allocations, and overflight restrictions limit routing flexibility. Where spoofing regions cannot be avoided, the primary mitigations are crew training, procedure adherence, and increased reliance on conventional navigation aids. Some operators have also requested enhanced ATC radar monitoring through spoofing-affected airspace.

Are regulators addressing the GPS spoofing threat?

EASA, ICAO, and the CAA are actively engaged on GPS spoofing. EASA has issued Safety Information Bulletins, Airworthiness Directives, and guidance for operators and crews. ICAO has published navigation guidance for GPS-degraded environments. The CAA has issued NOTAMs and operational guidance for UK operators. At the technical level, regulators and manufacturers are working on anti-spoofing measures — receiver autonomous integrity monitoring (RAIM) improvements, multi-constellation GNSS receivers, and authentication protocols for GPS signals. However, the root cause — state-sponsored electronic warfare — requires diplomatic and defence responses beyond the aviation regulatory system.

Discuss aviation cybersecurity with our team

Kyanite Blue specialises in cybersecurity for iGaming operators. MGA-licensed operators across Malta trust our stack.

Get in touch

Featured Product

Coro

Learn more

Ready to secure your iGaming operation?

MGA-licensed operators across Malta trust Kyanite Blue.