{"id":12345,"date":"2023-05-29T10:10:46","date_gmt":"2023-05-29T13:10:46","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=12345"},"modified":"2023-05-29T10:10:46","modified_gmt":"2023-05-29T13:10:46","slug":"senales-ais-falsificadas-forman-simbolo-de-invasion-rusa","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=12345","title":{"rendered":"Se\u00f1ales AIS falsificadas forman s\u00edmbolo de invasi\u00f3n rusa"},"content":{"rendered":"<p>La firma de inteligencia geoespacial Geollect ha identificado un patr\u00f3n AIS (Automatic Identification System) falsificado que traza el s\u00edmbolo &#8220;Z&#8221; de la invasi\u00f3n rusa de Ucrania en una posici\u00f3n frente a la costa de Crimea. Es el \u00faltimo de una larga serie de incidentes de suplantaci\u00f3n de identidad en la regi\u00f3n, y el patr\u00f3n se ha atribuido durante mucho tiempo a los actores del gobierno ruso. La suplantaci\u00f3n remota de GPS puede enga\u00f1ar a una unidad receptora de GPS para que calcule una ubicaci\u00f3n falsa. Entre otras aplicaciones, esta forma de interferencia de se\u00f1al se puede utilizar para derrotar los sistemas de gu\u00eda GPS de ciertos drones y armas de precisi\u00f3n fabricados en Estados Unidos y la OTAN. Seg\u00fan los informes, Rusia es competente en esta forma de guerra electr\u00f3nica.<\/p>\n<hr \/>\n<p>Geospatial intelligence firm Geollect has identified a spoofed AIS pattern tracing out the &#8220;Z&#8221; symbol of the Russian invasion of Ukraine at a position off the coast of Crimea. It is the latest in a long string of spoofing incidents in the region, and the pattern has long been attributed to Russian government actors.<\/p>\n<p>Remote GPS spoofing can trick a GPS receiving unit into calculating a false\u00a0location. Among other applications, this form of signal interference can be used to defeat the GPS guidance systems of certain U.S.- and NATO-made drones and precision weapons. Russia is reportedly proficient in this form of electronic warfare.<\/p>\n<p>There is a long history of GPS spoofing near Russian and Russian-occupied areas of the Black Sea coastline, and it periodically affects shipping. Since a ship&#8217;s AIS transponder broadcasts the location it receives from the ship&#8217;s\u00a0GPS unit, a broad-scale GPS spoofing attack will displace the &#8220;location&#8221; that the ship broadcasts via AIS, producing results that can sometimes appear bizarre. In 2017, more than 20 ships\u00a0<a href=\"https:\/\/maritime-executive.com\/editorials\/mass-gps-spoofing-attack-in-black-sea\" target=\"_blank\" rel=\"noopener\">reported<\/a>\u00a0that their GPS positions had been erroneously relocated 25 nm inland to the airport in Novorossiysk. Others at anchor appeared &#8220;clustered&#8221; in areas where there were no radar returns for ships.<\/p>\n<p>Over the course of 2017-19, non-profit analytics group C4ADS catalogued about 10,000 similar incidents affecting 1,300 vessels, most in or around areas of Russian influence. The report also drew a correlation between the movements of Russian President Vladimir Putin and the mass spoofing events, noted contributor and cybersecurity expert Dana Goward.<\/p>\n<p>In June and July 2021, three NATO warships &#8211; the Royal Navy&#8217;s USS\u00a0<em>Defender<\/em>, the U.S. Navy&#8217;s USS\u00a0<em>Ross\u00a0<\/em>and a Royal Dutch Navy vessel &#8211; all had their locations\u00a0<a href=\"https:\/\/www.maritime-executive.com\/index.php\/editorials\/who-moved-the-position-of-a-u-s-navy-ship-from-odessa-to-crimea\" target=\"_blank\" rel=\"noopener\">spoofed<\/a> to\u00a0positions off Russian-occupied Crimea. The reason and culprit remain unknown.<\/p>\n<p><img loading=\"lazy\" class=\"alignleft size-full wp-image-12347\" src=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2023\/05\/Geollect-z-2.webp\" alt=\"\" width=\"342\" height=\"314\" srcset=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2023\/05\/Geollect-z-2.webp 342w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2023\/05\/Geollect-z-2-300x275.webp 300w\" sizes=\"(max-width: 342px) 100vw, 342px\" \/>This month, a large number of merchant ships along the southern coast of Ukraine had their AIS locations remotely spoofed to the coastal waters of Russian-occupied Crimea. However, instead of a random pattern or a cluster, the AIS positions form a clear &#8220;Z&#8221; shape, the de facto symbol of support for the Russian invasion. This\u00a0AIS spoofing pattern was almost certainly created by\u00a0transmitting false AIS signals, mimicking the ships&#8217; actual AIS transmissions with corrupted duplicates, according to Geollect.<\/p>\n<p>&#8220;It is highly likely that this is a deliberate information operation by a pro-Russian actor (possibly Russian military psychological operations) ahead of an anticipated Ukrainian counteroffensive and\/or in celebration of Russia&#8217;s proclaimed victory over Bakhmut,&#8221; assessed Geollect.<\/p>\n<p>The pattern began to show up on AIS on the 14th, and strengthened from May 19-21. Putin declared victory over Ukrainian forces in Bakhmut on May 22. In a clear sign of spoofing, merchant vessel &#8220;speeds&#8221; between these erroneous AIS positions were as high as 100 knots, Geollect reported.<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/maritime-executive.com\/article\/spoofed-ais-signals-form-symbol-of-russian-invasion-off-crimea\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/maritime-executive.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La firma de inteligencia geoespacial Geollect ha identificado un patr\u00f3n AIS (Automatic Identification System) falsificado que traza el s\u00edmbolo &#8220;Z&#8221; de la invasi\u00f3n rusa de&hellip; <\/p>\n","protected":false},"author":1,"featured_media":12346,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,35,28],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/12345"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12345"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/12345\/revisions"}],"predecessor-version":[{"id":12348,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/12345\/revisions\/12348"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/12346"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12345"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12345"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}