Leanpub Header

Skip to main content

The Dark Art and Science of GPS Spoofing Second Edition

Satellite Wars Hijacked Signals, and The Invisible Threat

This is not a “pop science” book.

It’s a hard-edged technical manual exposing the mathematics, engineering, and electronic warfare science behind one of the most dangerous threats of our time: GPS spoofing.

Minimum price

$19.00

$29.00

You pay

$29.00

Author earns

$23.20
$

...Or Buy With Credits!

You can get credits with a paid monthly or annual Reader Membership, or you can buy them here.
PDF
About

About

About the Book

This is not a “pop science” book.

It’s a hard-edged technical manual exposing the mathematics, engineering, and electronic warfare science behind one of the most dangerous threats of our time: GPS spoofing.

Inside The Dark Art and Science of GPS Spoofing you’ll find:

  • Precise mathematical models of spoofing detection, including chi-squared testing, Mahalanobis distance, and probability-based thresholds.
  • Signal generation and manipulation formulas—frequency bands, pseudorandom noise codes, synchronization principles, and SDR-based implementations.
  • Step-by-step technical walkthroughs of spoofing methods, from replay and meaconing to advanced coordinated attacks.
  • Counter-spoofing algorithms rooted in signal processing, cryptography, and machine learning.
  • Rigorous analysis of multi-system GNSS integration, IMU redundancy, and performance under attack.
  • Hands-on experimentation frameworks—from lab setups with SDRs to field testing and validation.

This book isn’t about speculation. It’s about mathematical rigor, engineering precision, and applied science.

If you’re an engineer, researcher, defense analyst, or advanced student of navigation, electronic warfare, or cybersecurity, this book will push you deep into the mechanics of signal deception and defense.

It will challenge you. It will arm you with tools. And it will make sure you never look at GPS the same way again.

Share this book

Categories

Bundle

Bundles that include this book

Author

About the Author

gareth thomas

Gareth Morgan Thomas is a qualified expert with extensive expertise across multiple STEM fields. Holding six university diplomas in electronics, software development, web development, and project management, along with qualifications in computer networking, CAD, diesel engineering, well drilling, and welding, he has built a robust foundation of technical knowledge.

Educated in Auckland, New Zealand, Gareth Morgan Thomas also spent three years serving in the New Zealand Army, where he honed his discipline and problem-solving skills. With years of technical training, Gareth Morgan Thomas is now dedicated to sharing his deep understanding of science, technology, engineering, and mathematics through a series of specialized books aimed at both beginners and advanced learners.

Contents

Table of Contents

Chapter 1. Fundamentals of GPS Systems

Section 1. Introduction to GPS

  • History of navigation systems
  • Evolution of GPS technology
  • Overview of GPS features and applications
  • Modern GNSS systems: GPS, Galileo, GLONASS, BeiDou
  • Comparison with other navigation technologies

Section 2. GPS Architecture and Signal Structure

  • Space, control, and user segments
  • Signal encoding and pseudorandom noise codes
  • Frequency bands and data modulations
  • Time synchronization principles
  • Applications and limitations in various domains

Section 3. System Vulnerabilities

  • Susceptibility to interference
  • Authentication gaps in civilian GPS
  • Environmental factors affecting accuracy
  • Signal vulnerabilities and weaknesses

Chapter 2. Introduction to GPS Spoofing

Section 1. Overview of Spoofing

  • Definition and principles of GPS spoofing
  • How spoofing differs from jamming
  • Types of spoofing attacks
  • Impact on receiver operations

Section 2. Historical Context and Case Studies

  • Civilian incidents (maritime and aviation)
  • Military incidents and implications
  • Ethical considerations and lessons learned
  • Impact on autonomous navigation systems

Chapter 3. Signal Manipulation Techniques

Section 1. Basics of GPS Signal Generation

  • Signal simulators and SDRs
  • Synchronizing false signals with authentic ones
  • Fundamentals of signal creation
  • Signal processing principles

Section 2. Types of Spoofing Attacks

  • Simple spoofing techniques
  • Meaconing and signal replay attacks
  • Advanced coordinated spoofing
  • Demonstration methods in controlled environments

Chapter 4. Tools and Technologies for GPS Spoofing

Section 1. Hardware for Signal Manipulation

  • Overview of software-defined radios
  • GNSS signal simulators
  • Antennas and amplifiers
  • Commercial and open-source tools

Section 2. Software Frameworks and Implementation

  • Python and MATLAB for GNSS research
  • GNSS-SDR and GPS-SDR-SIM
  • Signal processing software
  • Hands-on guide to SDR setup and operation

Chapter 5. Counter-Spoofing Technologies

Section 1. Signal Authentication and Verification

  • Cryptographic protections
  • Anti-spoofing antennas
  • Signal monitoring techniques
  • Augmentation with other GNSS systems

Section 2. Detection Mechanisms

  • Analyzing signal anomalies
  • Machine learning applications for detection
  • Real-time monitoring systems
  • Building and testing detection algorithms

Chapter 6. Multi-System GNSS Integration

Section 1. GNSS Interoperability

  • Benefits of multi-system receivers
  • Integration of GPS, Galileo, GLONASS, and BeiDou
  • System synchronization and coordination
  • Performance optimization strategies

Section 2. Enhanced Navigation Systems

  • Integrating IMUs and GPS
  • Redundancy mechanisms
  • Applications in autonomous systems
  • Performance comparison in spoofing scenarios

Chapter 7. GPS Spoofing in Electronic Warfare

Section 1. Military Applications

  • Offensive strategies in electronic warfare
  • Defensive counter-spoofing techniques
  • Impact on military operations
  • Counter-counter-spoofing methods

Section 2. Critical Infrastructure Protection

  • Threats to infrastructure systems
  • Financial timing system security
  • Power grid protection
  • Transportation system vulnerabilities
  • Risk assessment and mitigation strategies

Chapter 8. Industry-Specific Applications

Section 1. Aviation and Maritime Security

  • Aircraft navigation protection
  • Maritime navigation challenges
  • Port security considerations
  • Industry-specific countermeasures

Section 2. Autonomous Systems Protection

  • Autonomous vehicle security
  • Drone and UAV protection
  • Smart city infrastructure
  • IoT device security

Chapter 9. Research Methods and Experimentation

Section 1. Laboratory Setup and Testing

  • Required tools, software, and best practices
  • Safety and ethical considerations
  • Experimental design principles
  • Data collection methods

Section 2. Field Testing and Validation

  • Real-world testing scenarios
  • Data analysis techniques
  • Performance validation methods
  • Publishing and sharing research findings

Chapter 10. Legal and Regulatory Framework

Section 1. International Standards

  • Laws governing spoofing and countermeasures
  • Certification requirements
  • Testing standards
  • Compliance frameworks

Section 2. Ethics and Policy

  • Ethical research guidelines
  • Policy development and enforcement
  • Dual-use technology considerations
  • International cooperation frameworks

Chapter 11. Emerging Technologies

Section 1. Next-Generation Systems

  • Quantum GNSS developments
  • AI-driven navigation systems
  • Blockchain applications
  • Future security innovations

Section 2. Advanced Threats and Countermeasures

  • AI-powered spoofing techniques
  • Quantum computing implications
  • Adaptive defense systems
  • Emerging vulnerability research

Chapter 12. Economic and Business Aspects

Section 1. Market Analysis

  • Cost-benefit analysis of security measures
  • Insurance and liability considerations
  • Commercial solutions evaluation
  • Industry trends and developments

Section 2. Implementation Strategies

  • Risk assessment frameworks
  • Resource allocation
  • ROI calculations
  • Strategic planning methods

Chapter 13. Practical Training and Simulation

Section 1. Training Systems

  • Digital twins for GNSS testing
  • Virtual training environments
  • Simulation tools and frameworks
  • Hands-on exercise development

Section 2. Skill Development

  • Programming and debugging skills
  • System integration techniques
  • Practical implementation guides
  • Professional development paths

Chapter 14. Future Directions

Section 1. Research Trends

  • Emerging technologies and threats
  • Innovation opportunities
  • Research priorities
  • Technology forecasting

Section 2. Global Collaboration

  • International research initiatives
  • Standards development
  • Information sharing frameworks
  • Future security challenges

The Leanpub 60 Day 100% Happiness Guarantee

Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.

Now, this is technically risky for us, since you'll have the book or course files either way. But we're so confident in our products and services, and in our authors and readers, that we're happy to offer a full money back guarantee for everything we sell.

You can only find out how good something is by trying it, and because of our 100% money back guarantee there's literally no risk to do so!

So, there's no reason not to click the Add to Cart button, is there?

See full terms...

Earn $8 on a $10 Purchase, and $16 on a $20 Purchase

We pay 80% royalties on purchases of $7.99 or more, and 80% royalties minus a 50 cent flat fee on purchases between $0.99 and $7.98. You earn $8 on a $10 sale, and $16 on a $20 sale. So, if we sell 5000 non-refunded copies of your book for $20, you'll earn $80,000.

(Yes, some authors have already earned much more than that on Leanpub.)

In fact, authors have earned over $14 million writing, publishing and selling on Leanpub.

Learn more about writing on Leanpub

Free Updates. DRM Free.

If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).

Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.

Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.

Learn more about Leanpub's ebook formats and where to read them

Write and Publish on Leanpub

You can use Leanpub to easily write, publish and sell in-progress and completed ebooks and online courses!

Leanpub is a powerful platform for serious authors, combining a simple, elegant writing and publishing workflow with a store focused on selling in-progress ebooks.

Leanpub is a magical typewriter for authors: just write in plain text, and to publish your ebook, just click a button. (Or, if you are producing your ebook your own way, you can even upload your own PDF and/or EPUB files and then publish with one click!) It really is that easy.

Learn more about writing on Leanpub