GPS is ubiquitous in our everyday lives and widely used and trusted for navigation and other services. GPS is also the fundamental source of time for most broadcast production and streaming networks. As such, broadcast networks depend on GPS for reliable operation. GPS is vulnerable to a long list of threats, including jamming & spoofing attacks. The paper will explain how jamming and spoofing attacks are executed, share surveys of global jamming and spoofing events, contrast accidental vs. military or state-sponsored attacks, explain how jamming and spoofing are done both hardware and software, explain different types of attacks (non coherent blunt, non coherent "break the lock", and coherent, mimic first, then drift), introduce a series of technologies and tools to mitigate these problems, and compare and contrast their effectiveness, including test results from live-sky test events.
