Burger menu

Spoofing in Geography and Countermeasures

Geography spoofing is a technique of concealing or falsifying location.

What Is Geo-Spoofing?

Newark Liberty International Airport near which a GPS-spoofing incident took place in 2013

Geographical spoofing is a technique of hiding someone’s location or even counterfeiting a genuine GPS signal. It can be done for both neutral and nefarious purposes. In the former scenario it is performed to bypass geographical restrictions that can be put on online services, content, information, and so on.

In the latter case, the technique, basically, turns into an attack: it can be used to falsify coordinates for misdirection, alter destination, disguise geographic location of a malicious actor, and even “move the borders” of a country as outlined by Alistair Maclenan in the Fake Geography article.

Examples of Location Spoofing

There’s a record of the geography spoofing incidents.

  1. Examples of Spoofing in Geography
Overview of the GPS-spoofing detection algorithm for the IoT devices

Geo-spoofing has been registered since at least the early 2010s. Notably, marine geo-spoofing was observed in 2013 when an 80-million dollar yacht was misdirected by the University of Texas researchers who “hijacked” the vessel’s GPS receivers with a special device.

In 2013, an incident occurred near the Newark Liberty International Airport, near which a truck driver used a GPS jammer to “hide his whereabouts from his employer”. Jamming caused interference to the ground-based augmentation system, which provides differential corrections to the navigation system — it resulted in a $31,875 fine for the driver.   

Internet of Things (IoT) gadgets are also vulnerable to the attack. A detection algorithm dubbed ELSA is proposed to solve the issue: it employs Enhanced Location Spoofing Detection using Audibility and implicit available audibility information to avoid attacks.

  1. Spoofing in Location-Based Games
World’s Pokemon distribution (Mollweide projection)

Pokemon Go is the most notable example of a GPS-based game. It was reported that players used GPS spoofing with the help of available specialized apps to change locations. 

The motive could be that some countries have better hunting grounds: e.g., the US have such regionals as Heracross and Corsola, as well as top hotspots where rare Pokemons may spawn. To avoid detection, they used reasonable time intervals before spoofing GPS to imitate traveling.

  1. Location Spoofing

A positive example of GPS spoofing took place in 2009 in Iran during the presidential elections — International Twitter users set their GPS signal and time zones to Teheran to confuse the local authorities who tried to identify opposition leaders and their location through their tweets.

A similar incident occured In 2011, during the Arab spring, it was reported that Geo-spoofing was used to shield protesters in Egypt and Tunisia from the riot police ambushes. 

Deepfake Geography

Examples of fake satellite images (a,c,d) created with a CycleGAN

It is acknowledged that some generative models — based on a Cycle-Consistent Adversarial Network (CycleGAN) or Neural Radiance Fields (NeRF) — are capable of creating complex and realistic images of places and scenery. For example, such an image can be presented as a bona fide satellite image both to a human observer or an AI-operated system.

Detection of Location Spoofing in Geography

Geographer Waldo Tobler formulated the first law of geography

The assortment of the detection methods for Geo-spoofing is rather scarce at the moment. However, there are some concepts that can help reveal such attempts.

One of the methods employs the Bayesian time geographic approach, as it helps detect spatial-temporal dynamics that GPS-spoofing typically displays. It sets specific mobile constraints that, for example, a human cannot violate physically. If the violation is detected, the system labels it as spoofing.

The space-time cone for detecting GPS-spoofing

Another approach, for detecting deepfake locations, relies on common geographical knowledge. For example, such a method can benefit from Waldo Tobler’s first geography law that states that objects located near each other are more related than distant objects. If a certain loctaion’s characteristics go against the rule, then there’s a high probability it’s a deepfake image.

Try our AI Text Detector

Avatar Antispoofing

1 Followers

Editors at Antispoofing Wiki thoroughly review all featured materials before publishing to ensure accuracy and relevance.

Article contents

Hide

More from AI Generated Content

avatar Antispoofing History of AI Picture Generators

When Did the First AI Image Generators Appear? The earliest known AI image generator can be dated back to 1973…

avatar Antispoofing Use of Deepfakes in Arts and Culture

Are Deepfakes Used in Art? Generative AI is used for multiple positive purposes in arts, culture, and media. For example,…

avatar Antispoofing Positive Impact of Deepfake Technology in Science

Can Deepfakes Have Positive Applications? There is a cornucopia of ways to use deepfake technology positively. It is estimated that…

avatar Antispoofing The Top 3 Knowledge Distillation Attacks and Defenses Against Them

What Is Knowledge Distillation? Knowledge distillation (KD) is a process of transferring knowledge from a more sizable neural model to…