• You Are Here: Home > News
  • > Jam & Spoof: What You Need to Know About Truck Hacking
Jam & Spoof: What You Need to Know About Truck Hacking

When it comes to cargo crime and the security of equipment and freight, carriers should start becoming very familiar with the terms “jamming” and “spoofing.”

They are both rare – but increasing – forms of telematics hacking in Europe, which are on their way to making it into the tool box of cargo thieves in North America, reports Fleet Owner magazine.

“GPS jamming is very prevalent right now, and the jamming equipment is easily procured and very inexpensive,” Guy Buesnel, product manager for the positioning & navigation business unit at Spirent Communications, told Fleet Owner. “We know that criminals are starting to use jammers to carry out crimes. For example, in Italy gangs have been targeting shipments of scrap metal. They hijack a truck, force the driver to pull over, hold the driver captive and then use a GPS jammer so the cargo can’t be tracked as they drive off with it.”

Spoofing is a little trickier to conduct, Buesnel said, because it involves “faking” a GPS signal.

There’s little precedent for it, but Buesnel says in the future spoofing is going to be a real threat to navigation, positioning, and timing systems because criminals are already getting into application software and faking GPS coordinates.

“Without understating how your receiver behaves with jamming and spoofing attacks, you’re taking a really big risk in trusting the data it outputs,” he explained. “In order to cope with this, you need to know how robust your equipment is today and to be prepared. And you can only do that if you assess your risks and then test your equipment against current and future trends.”

Buesnel  says carriers need to closely monitor how their company’s IT network is constructed.

“With fleet networks, often the focus is on the trucking and delivery aspects, and all too often the IT components—servers, routers, firewalls, etc.—aren’t necessarily taken as seriously,” Buesnel noted.

“But people can get into the networks and start messing with data, which can impact delivery schedules, for example,” he explained. “This can easily be addressed by looking at what you’re building and figuring out how to properly secure it.”

Full article here.

Share This Story