Reading up on the latest Info-warfare solutions that we theorize that Iran has at their disposal, it looks as if they have the proper surface-to-air platforms to use to perform this attack. Just keep in mind that jamming most RF signals is entirely possible, just by broadcasting “noise” on the same set of frequencies that the RF receiver is trying to listen in on.
GPS Jamming – GPS jamming is extremely easy. Heck you can now find complete kits on the Internet to perform just about any jamming you need. Worried about privacy issues, install a jammer. Worried that law enforcement has installed a GPS or Lo-jack tracker on your car, install a jammer. Yep, its that easy.
Note – Just remember that it is illegal for you to build or use one in the US (as well as many other countries).
Waypoint Hacking – This is the most interesting point of the Iranian hack. According to some of the articles, Iran claims to have altered the GPS signal going to the UNAV system and giving the plane enough information to land safely at a location in Iran. What is impressive here are the technical challenges to perform this hack:
- Pushing updated data to the craft – The part I struggle with the most, is the claim that a ground-based tracking station/platform was used to performed this attack. As I stated, jamming is rather easy. But jamming while also updating coordinates is complex… especially when doing this to a craft that is above your elevation, fling at 200+ MPH, and you are overriding a signal coming from a satellite that is located above both you and the target. I’d love to hear from any military types on this capability. But as stated, its one heck of a hurdle to overcome.
- Knowing the Waypoint to Spoof/Alter – To have the plane land at a location of your choosing assumes you know where its original destination was located at to begin with. Since Iran stated they analyzed several previously crashed aircraft, I’ll have to assume they were able to gather this information through these or more traditional information gathering efforts..aka – everyone in the region knows all the planes come from 1 or 2 bases.
- Overriding The Waypoint – The other part I struggle with in the articles is the statement that Iran chose where to land the plane. This basically assumes that they tricked the plane into thinking it was over Afghanistan instead of Iran and was to land at its pre-determined waypoint. All jokes aside about both places being mostly desert, still the locations are not identical. To do this part of the attack, you have to overide not only the physical location but also important factors such as the topology of the landing site… aka altitude, approach angle, and wind direction.
It is these last three challenges that make me question the validity of the “hack” that took place, at least as described so far. But since I know the challenges, I’m also eager to hear on the techniques and solutions to overcome these hurdles. As always, I’ll wait to hear more before giving a final verdict, but just wanted to open up a discussion on the basic hurdles that needed to be overcome for this attack to work.