1. Introduction—What Was Jammertest?
Jammertest 2022 was an event held from the 19th through to the 23 September 2022 on the island of Andøya on the Norwegian coast, and was an exceptional opportunity for the international navigation community due to each of the locations selected, the data access policies enacted by the organizers, and the selection of the tests conducted.
The location, adjacent to the community of Bleik, was ideal for carrying out jamming and spoofing tests for a number of reasons. The first and primary beneficial feature was the high ridgeline which surrounded the test location on three sides. With peaks exceeding 400 m above sea mean sea level and lying close to the transmission site, this ridge line not only protected the mainland from the emitted signals but also prevented the signal from propagating into much of the airspace surrounding the island. Signals could only freely propagate within the test area and to the northeast out to the northern Atlantic.
The Jammertest data access policies were also ideal in that attendees were allowed to freely discuss and publish their observations and results. Typically, jamming and spoofing exercises, along with the data collected through these exercises, are considered to be sensitive, possibly due to the perceived potential for misuse. Given that both jamming and spoofing are widely discussed in publicly accessible papers in both technical and general media publications, the decision was made that the utility of allowing relevant industrial, governmental, research, and academic institutions to freely discuss the observed phenomena outweighed remaining concerns around publication. The specific tests carried out at Jammertest were numerous and are detailed in
Section 3.
2. Test Site, Setup, and Selection
Jammertest made use of several locations on the island of Andøya for different purposes, including the hosting of the participants, static emission sites, static reception sites, dynamic testing areas, and ad hoc evaluation points (all shown in
Figure 1). The map in
Figure 1 is labeled with five zones that were used for different purposes during the week.
Location 1 at the northernmost extent of the island was the local host community where the majority of test participants were housed.
Location 2 to the North of the community of Bleik and adjacent to the local cemetery was used as an equipment deployment and emissions site for the high-power jamming sources, as well as for the testing of helicopter navigation systems.
Location 3 at the Bleik community center was the primary meeting base camp, setup and equipment preparation point, and deployment area for static receiver testing. It was also used as the first low-power Personal Privacy Device (PPD) test area. A collection of PPDs used by the Norwegian Communication Authority (Nkom) during the test activities is shown in
Figure 2.
Location 4 at Bauktuva was a roadside parking area on a low hilltop used for making safe turns for single vehicles and platoons of vehicles (participating in tests).
Location 5 at Grunnvatnet was protected from emissions by the high-power jamming sources by local topography and was used as a second low-power/PPD test area.
The testing carried out during the event was designed to expose participants to as many forms of signal interference as possible and in as many ways as possible to help evaluate navigation system behavior in conditions of interest to as many different user segments as practical. Since the most common form of jamming most navigation users will encounter is emitted either unintentionally or from PPDs, it was natural to include both an array of PPDs as well as custom-generated signals. Since many sources of unintentional Radio Frequency Interference (RFI) are narrowband in nature [
1], it was decided that several of the sub-tests should include Continuous Wave (CW) signals.
In addition to the PPD and ‘unintentional’ signal-like CW sources, a number of other modulations and power profiles were used to help simulate other scenarios or to try to stimulate failure modes in receiving equipment which may not normally arise. One example of this approach includes the progressive jamming of multiple Global Navigation Satellite System (GNSS) signal bands and modulations where a new modulation was periodically added incrementally to the list of jammed signals before being removed in the reverse order. This so-called modulation ‘pyramid’ was intended to test the potential fallback behavior of modern multi-constellation multi-frequency receivers. Similarly, some tests were conducted with ramping power levels to better evaluate the sensitivity thresholds of various systems or, in other cases, persistent high-power jamming on one or more bands to provide both static and dynamic testing opportunities.
3. Scheduled Tests
In order to accommodate as many use cases as possible, the testing was split into multiple morning and afternoon sessions over the five days of testing at a primary site, in addition to periodic tests at a secondary site and the convoy testing of vehicles on the local roads. While it is not possible to list all of the tests carried out by all of the various participants here, a summary in the form of the transmission schedule used by the Norwegian Communications Authority, the Norwegian Defense Research Establishment, and the Norwegian Metrology Service for the primary test site has been reproduced for the purposes of this paper and is shown in
Table 1.
4. Jamming Observations
The behavior of the receivers observed by the authors ranged from completely expected to entirely unexpected. Outcomes that were in line with the expectations of the authors included the relatively good resistance of mass-market receivers to CW interference, as several of these models are advertised to contain CW detection and or mitigation support in the receiver firmware. While the 20 W EIRP transmissions were still enough to cause loss of lock to these receivers, their resilience to one of the most commonly observed forms of RFI based on long term international monitoring [
2] is encouraging.
A neutral observation from the jamming tests related to the relative behavior of survey receivers compared to mass-market devices when subjected to persistent strong jamming signals. When the high-end receivers are subjected to ‘moderate’ levels of RFI on all their tracked signal bands, their firmware will selectively halt the output of observables, with some models appearing to have a cut out at 36 dB-Hz. In comparison, mass-market receivers that come from product families formerly marketed as being ‘high sensitivity’ tend to continue outputting observables and position solutions at these and lower signal levels. This latter case led to multiple observations of a low-cost receiver continuing to generate a position solution even as the position error increased to hundreds of meters, as is shown in
Figure 3. Appropriately, the receiver generated increased uncertainty estimates and appeared to consistently bound the actual position error, meaning that the generated information is not hazardously misleading if the reported uncertainty is used by the target application.
An unexpected observation that is reasonable in retrospect is that multi-band multi-constellation receivers can manifest problems with timing synchronization when a subset of their signal bands are jammed. In the context of positioning, these systems appear to fall back almost universally to remaining available signals when a subset of their tracked signals are denied by persistent jamming and continue to generate observables and position plus velocity information to the user; however, timing synchronization can encounter unexpected behavior. When the signals from the constellation selected for time scale synchronization are denied for an extended period, some receiver models appear to fail to maintain their synchronization to the selected timing reference and begin to rapidly drift in time while maintaining other outputs. While not expected at the time of the tests, this behavior does pose an interesting design question for receiver firmware as it is not immediately obvious what the ‘correct’ answer to this situation is. One potential answer is that the receiver should rely on the data transmissions from other constellations, which include relative time offset information to indirectly track the selected time scale even when signals from the reference constellation are unavailable. Another potential approach is to simply halt outputting a solution as it is no longer possible to directly observe the selected time scale. Based on observed real-world behavior, it seems that some models of receivers have undefined or at least undocumented behavior with respect to their time scale synchronization when exposed to the jamming of the reference constellation, which could be more concerning to some users than a lack of outputs.
5. Spoofing Observations
The spoofing tests were physically arranged to allow as many participants as feasible to place their equipment under test within the line of sight of the transmitting antenna at a distance of less than approximately 20 m where possible. Based on this combination of criteria and the layout of the site in terms of where the spoofing signal generation equipment could be set up, the transmission antenna was placed in the middle of the front parking lot of the Bleik community center. One of the motivating factors for allowing users to operate as close to the transmission location as possible was the desire to minimize the amount of transmitted power required while also allowing the spoofed position information to be correct. The testing plan for the spoofing signal generation tests is included in Annex 1 for tests categorized as simple and Annex 2 for tests categorized as advanced.
Generating GNSS navigation signals that successfully masquerade as legitimately generated signals is difficult, with several publications indicating specific signal generation defects that can be used to aid in the detection of spoofed signals [
3,
4], including but not limited to time variation, correlation variation, position discontinuities, inconsistent observable data, incorrect ephemeris, or timing errors. In the Jammertest 2022 spoofing program, the distinction between the ’simple’ spoofing tests and the ‘complex’ spoofing tests is the use of correct current ephemerides provided by the Norwegian Mapping Authority (Kartverket), together with the precise time keeping at the level of tens of nanoseconds for the latter. While the so-called simple tests could still entail careful pre-jamming, stable and high-fidelity signal generation, correct simulated ephemerides, and accurate initial position generation, the inclusion of precise synchronization enabled the evaluation of network timing receivers in addition to navigation-focused GNSS equipment. Attention to the generation of a representative and stable spoofing signal is particularly important given that some methods of potential spoofing investigation and detection might rely on the interaction of the produced signal with intentional antenna motion [
5,
6] or other isolation techniques which may be complicated by an unstable signal source. This presents a challenge where the given signal would ideally be useful to everyone, which can be partly addressed through providing both ‘simple’ and ‘complex’ spoofing scenarios such as those provided at Jammertest 2022.
Some of the observations of note from the author’s experiences during the test include expected results such as entry-level receivers (such as those integrated into the phones of the participants) being very quickly fooled by the spoofed signal. In one case, one of the participants took advantage of the spoofing tests to activate a fitness training app which happily believed the owner ran a distance of six kilometers (climbing over 450 m vertically) within six minutes and allowed them to post it to social media as a new ‘personal best’, indicating that the phone has no inertial sanity checking and that the app has no filtering for superhuman feats (
Figure 4).
An unfortunate observation was that some high-end receiver systems supporting quadruple constellation triple frequency operation could be driven into apparently unrecoverable states via the single-frequency spoofing and multi-frequency jamming combinations of even the simple spoofing tests. Despite having an internal oscillator that is relatively stable, the receiver transitioned from tracking real signals to tracking the spoofed signals after only a short period of jamming but then would not recover after the removal of the spoofing and jamming. Instead, more than 40 min after the removal of the perturbing signals, the receiver reported that it was tracking only several GLONASS satellites and one QZSS satellite, stating that the receiver altitude was 1500 m higher than in reality and that it was slowly floating away ever higher.
A beneficial outcome of the spoofing tests was that even when the spoofing signals were generated with a power level approximately 20 dB (too weak to impact the assembled receivers), systems with in-band power level monitoring capabilities still noted significant and obvious changes in the level of their respective automatic gain control feedback states or measured in-band power levels. This is encouraging as it implies that even relatively low-cost receivers that generate Automatic Gain Control (AGC) level outputs have an additional avenue available to them for the detection and reporting of potential spoofing signals.
6. Unexpected Observations
The first of the notable unexpected observations was that on the morning of Tuesday 20th September, the scheduled power ramp test was apparently interrupted by multiple events of unintentional RFI. This test presented an opportunity for evaluating the detection thresholds of various pieces of equipment, including the Advanced RFI Detection Analysis and Alerting System (ARFIDAAS) monitoring system [
2], which includes direct band power measurement instruments as part of its normal detection process. Monitoring using the ARFIDAAS system started approximately three minutes before the designed test start time, and the system almost immediately began detecting and logging events. Over the three-minute period between the start of logging and the start of the test, three separate RFI events were captured. Since the test was scheduled to start with an extremely low EIRP of approximately 2 nW, it was initially thought that these detections implied that either an incorrect attenuator setting had been selected at the transmission site or that an unrelated project participant had mistakenly activated one of the test PPDs without permission; however, upon a closer inspection of the three events, none of them matched either the expected test signals or the known signals from the PPD selection. Upon further review, three distinct RFI signals of unknown origins had been captured coincidentally in the time prior to the start of the test and despite the remote nature of the test site. The first of these was a ‘chirping’ signal thought to be formed by self-resonant feedback in car-borne navigation or entertainment systems impacting the G1 band; the second was a pulsed CW source near the Beidou B6 center frequency, while the third was a continuously active 1200 MHz narrowband signal. A spectrogram of the unintentionally generated ‘chirping’ signal is presented in
Figure 5. Here, it should be noted that while the modulation appears to be a form of chirp signal, the center frequency and limited bandwidth of the signal indicate that it would be a relatively ineffective jammer to use against GPS, Galileo, and Beidou signals, though might present difficulties for GLONASS reception.
A second unexpected observation was that some of the receivers used by the participants to evaluate Network RTK service performance during jamming and spoofing were disrupted by the RFI in a way that was not predicted to be a point of failure before the testing. In at least one receiver model, the loss of RTK performance was not caused by the degradation of the GNSS observables but instead by the disruption of the 2.4 GHz Wi-Fi-based data link between the receiver and the controlling computer acting as a correction relay to the receiver. It is unclear how much energy the jamming devices in question were leaking at or near the 2.4 GHz band used by the receiver’s Wi-Fi link, but observations in the wild have shown the opposite situation, whereby malfunctioning Wi-Fi devices act as GNSS jammers by emitting at half of their expected operating frequency. This shows an additional danger of cheap jammer devices, in addition to their intended purpose the poor production value can cause additional interference in other, not-intended bands.
A third surprise came in the form of the difficulty encountered in calibrating the power level employed in spoofing the collected GNSS receivers. Before shipping the signal generation equipment to the venue, the selected scenarios were generated and tested in the Norwegian metrology service’s (Justervesenet) lab to tune parameters such as the transmitted power level. However, after setting up on site and initial attempts were made to generate the spoofing signals for the test scenarios, none of the user receivers were initially captured by the generated spoofing signal. It was eventually necessary to increase the transmitted spoofing power by 20 dB relative to the starting point. Some of this difference was eventually explained by the use of a different cable assembly between the signal generator and the transmitting antenna, but this is not thought to explain the entirety of the change power level requirement. Despite careful preparation, generating a realistic minimum power spoofing signal was demonstrated to be challenging once more.
A final unexpected observation was that some of the highest-end navigation systems evaluated had more significant problems as a result of the generated signals than their much lower-end counterparts. For example, one of the mass-market automotive platforms appeared to be unaffected in terms of reported position solution by the generated spoofing due to integration with a set of low-cost Micro Electro-Mechanical Systems (MEMS) inertial sensors, while one of the high-end navigation systems, which integrated a ring laser gyroscope-based Inertial Navigation System (INS), accumulated a kilometer-level navigation error during jamming tests and could not recover until power cycled. The assumption is that the automotive receiver was successfully leveraging Zero-velocity Update (ZUPT) detection while the high-end platform intended to operate in an airborne platform may not have supported this state detection, as this effect was not expected to be observed in normal operation.
7. Conclusions and Data Availability
One of the standout observations from the tests was that various pieces of receiver equipment manifested behaviors that could be considered naive or counterintuitive when faced with jamming and spoofing signals, which indicate that the device firmware does not appear to be designed to monitor for or guard against the impacts of these threats. For example, integrated systems such as smartphones or network-connected receivers make no observable attempt to mitigate spoofing attacks that utilize obviously incorrect timing information. While the timing and positioning gap is not as egregious as that observed during the spoofing incident at ION 2017 [
7], even a modest cost quartz oscillator should not be fooled by jumps of several seconds after a short period of signal denial, but this was observed during Jammertest. Hopefully, in the coming years, manufacturers will continue to deploy anti-jamming and anti-spoofing technologies within their receivers that can leverage even simple AGC state behavior to mitigate the impacts of these threats, implement firmware that can exploit the diversity of timing sources such as network timing protocol servers to prevent gross errors, or, at least, adjust their firmware parameters to allow receivers to gracefully recover within an hour of spoofing termination if they insist on allowing their clock to jump by tens of seconds in the first place.
The activities at Jammertest 2022 were an invaluable opportunity for commercial, governmental, research, and academic organizations to observe the behavior of GNSS-dependent navigation and timing equipment under jamming and spoofing conditions. While other events of this nature have been held before, the policy of open data access sets this event apart and provides a chance for others to learn from the experiences of the attendees not just through abstracted publication but also through the direct sharing of captured data.
The authors of this paper are pleased to be able to make available selected subsets of the testing data captured at Jammertest 2022 from the primary site tests. These data include raw IF spectrum captures of the L1/E1/G1 band captured with 40 MHz complex sampling during the entirety of the spoofing tests, as well as other data captured by the ARFIDAAS monitoring station via SINTEF, ublox F9P receiver data captured during various jamming and spoofing tests throughout the course of the test plan (captured via Kartverket and a centimetric network), and RTK receiver data captured throughout the tests via Kartverket. For access to these data, please contact the corresponding authors.