PNT Security Technologist
In his role as a PNT Security Technologist, Guy is responsible for developing Spirent’s approach to address the issues of GNSS vulnerability such as Jamming, Spoofing and Cyber-attack. Guy has more than 16 years’ experience working protecting GNSS Receivers from emerging threats, having started his career as a Systems Engineer involved in the development of GPS Adaptive Antenna Systems for Military Users at Raytheon Systems Limited in the UK. Guy has a BSc Honours degree in Physics with Atmospheric Physics from The University of Wales Aberystwyth and a Masters Degree in Communications Engineering from The University of Birmingham. Guy is a Chartered Physicist, and was elected as a Fellow of the Royal Institute of Navigation in 2015 for his services to GNSS vulnerabilities.
Presentation: Securing GNSS for Critical Infrastructure
Many critical infrastructures are dependent on GNSS to provide precise timing and positioning data. This paper highlights the risks to critical infrastructure of using GNSS without understanding its inherent vulnerabilities.
The author will introduce the most relevant real-world threats to GNSS, illustrated with a number of real examples in each of the threat categories. The threat categories will include GNSS interference, spoofing, atmospheric effects and segment errors. It will be shown that the real world examples presented could have impacted operations of unprotected systems.
The author will also highlight that our dependence on GNSS is such that when real-world threats are experienced, human error is also something to be guarded against. Having presented the risks of using unprotected GNSS systems, it will be shown that there are malicious actors who may use GNSS as one of the attack vectors to try and disrupt critical infrastructure operations – the author will show that there is evidence that GNSS hacking is evolving and that increasing the security of GNSS is necessary to guard against this. Finally a discussion of risk assessing systems and devices will be presented. It will be shown that it is possible to put a framework into place that can improve the security of GNSS systems or devices that provide precise timing and/or positioning information.