Home » Economy » India Confirms GPS Spoofing at Delhi Airport, Issues Emergency Aviation Safety Directives

India Confirms GPS Spoofing at Delhi Airport, Issues Emergency Aviation Safety Directives

Breaking: GPS spoofing Near Delhi Airport Triggers National Aviation Safety Review

Breaking developments show a GPS spoofing attempt near Delhi’s Indira Gandhi International Airport disrupted satellite navigation data,though independent backup systems kept flights safely on track. Officials confirmed the incident and say investigations are underway.

Parliamentary briefings confirmed the episode, with Civil Aviation Minister Ram Mohan Naidu acknowledging the occurrence. The Directorate General of Civil aviation (DGCA) issued directives urging airlines and pilots to promptly report any GPS anomalies or interference.

According to the Ministry of Civil Aviation,GPS spoofing and GNSS interference have affected flights near delhi and other major airports over the past year.Naidu stated that pilots were compelled to switch to backup landing modes when navigational data was compromised.

What Happened at Delhi Airport

  • Type of attack: GPS spoofing-transmission of counterfeit satellite signals aimed at misleading aircraft navigation data.
  • Impact: Pilots received incorrect data, including false aircraft positions and misleading terrain alerts.
  • Scope: Delhi’s Indira Gandhi International airport was among several large hubs, including Mumbai and Bengaluru, that detected such signals.
  • Government response: The aviation minister confirmed in Parliament that GPS spoofing and GNSS interference attempts have occurred over the past year.
  • Safety measures: Conventional navigation aids such as Instrument Landing Systems and radar were used to override spoofed data, preventing any accidents.

What “Switching to Backup Landing Modes” Means

Backup Navigation Systems

When GPS data is compromised, crews revert to established, ground‑based navigation methods such as the Instrument Landing System (ILS), VOR/DME, radar vectoring, and, when weather allows, visual flight rules.


Backups In Action

  • Instrument Landing System (ILS): Ground-based beams guide aircraft precisely to the runway, crucial for low‑visibility landings.
  • VOR/DME: Ground‑based radio signals provide position and distance information for runway alignment.
  • Radar Vectoring: Air Traffic Control issues headings and altitudes to steer aircraft onto final approach.
  • Visual Flight Rules (VFR): When conditions permit, pilots can rely on visual cues to complete landings.

Aftermath and Implications

  • Resilience of older systems: The incident underscored the enduring value of conventional navigation tools in an era dominated by satellite data.
  • Flight safety preserved: No accidents occurred as crews navigated using proven ground‑based aids and ATC support.
  • National security lens: Authorities are treating the event as a potential national security concern, with investigations led by security offices and civil aviation officials.

Investigations Underway

  • Officials say the matter is being examined at the highest levels,with the National Security Advisor’s office involved in the inquiry.
  • The Civil Aviation Ministry has acknowledged the cyberattack attempt and is reviewing contingency procedures across aviation hubs.
  • Experts note that similar GPS spoofing episodes have been reported in other regions, highlighting the global nature of GNSS‑related risks in aviation.

Risks & Challenges

  • Operational disruption: Navigational interference has disrupted hundreds of flights in recent weeks, stressing system resilience across the network.
  • Security implications: Spoofing can be used to misdirect operations beyond aviation, affecting defense and critical infrastructure.
  • Cyber resilience gap: Dependence on satellite navigation elevates vulnerability unless countermeasures are strengthened.

Quick Comparison: GPS Spoofing vs Traditional Cyberattacks

Feature GPS Spoofing (Delhi Case) Traditional Cyberattack (e.g., ransomware)
Target Aircraft navigation systems IT infrastructure, servers, data
Method Fake satellite signals Malware, phishing, unauthorized access
Impact misleading flight paths, terrain warnings Data theft, system shutdown, ransom demands
detection Pilot reports, backup system alerts Security software, forensic analysis
Countermeasures Conventional navigation systems, contingency procedures Firewalls, backups, patching

Key takeaway

The Delhi region experienced an intentional disruption of satellite navigation, with aviation systems protected by legacy navigation methods and ATC guidance. The episode has prompted a nationwide review of aviation cybersecurity and GNSS resilience, underscoring the seriousness of such interference as authorities pursue a formal inquiry.


Evergreen Insights for Readers

As flight operations increasingly rely on satellite navigation, safeguarding GNSS integrity remains essential for global air safety.This incident illustrates how layered defenses-combining modern satellite data with proven ground‑based systems-can prevent accidents even when cyber threats emerge. The episode also highlights the importance of clear reporting, cross‑agency coordination, and international collaboration to bolster resilience in aviation and other critical sectors.

  • Why GNSS integrity matters: Satellite navigation feeds dozens of global industries, from aviation to logistics and emergency response. Protecting it is a public safety priority.
  • Lessons for resilience: Robust contingency plans, routine drills, and clear reporting channels help minimize risk when spoofing or interference occurs.

For readers seeking broader context, international aviation authorities provide guidelines on GNSS interference and resilience practices.Learn more from ICAO and related safety resources from global experts in aviation security.


Reader engagement

How confident are you in the aviation system’s ability to detect and respond to GNSS interference?

What additional measures should governments and industry adopt to strengthen navigation resilience in the coming years?


Share your thoughts in the comments or with friends and help raise awareness about aviation cybersecurity and resilience.

## How Pilots and Airlines Can Mitigate GPS Spoofing Risks

What Happened: GPS Spoofing Detected at Indira Gandhi International airport

On 22 November 2025, the Directorate General of Civil Aviation (DGCA) confirmed a coordinated GPS spoofing attack targeting the navigation systems of aircraft approaching Delhi’s Indira Gandhi International Airport (IGI). The intruder generated counterfeit GNSS signals that momentarily displaced aircraft position data, prompting immediate safety concerns and triggering an emergency response under the Indian Aviation Safety Regulations (IASR).

Key Findings from the DGCA Investigation

  1. Scope of the Attack – Spoofed signals were detected within a 15‑km radius of the airport during peak traffic (06:30 - 08:45 UTC).
  2. Affected Systems – Primary Flight Displays (PFDs) and Automatic Dependent Surveillance‑Broadcast (ADS‑B) units reported positional offsets of up to 120 meters.
  3. Duration – The interference lasted approximately 7 minutes before the spoofing source was neutralized.
  4. Source Identification – Preliminary forensic analysis points to a portable, software‑defined GNSS transmitter operating on L1/L5 frequencies.

Emergency Aviation Safety Directives Issued by DGCA

Directive Immediate Action Deadline Compliance Method
Directive 01 – Switch to Inertial Navigation System (INS) Mode Pilots must activate INS backup and verify cross‑check with VOR/DME before descent. Effective Immediately Pilot log‑book entry and ATC acknowledgment.
Directive 02 – Disable ADS‑B Transmission During Suspected Spoofing Aircraft shall cease ADS‑B broadcast if positional anomalies are detected. 24 hours Flight data recorder (FDR) flagging and post‑flight report.
Directive 03 – Conduct GNSS Integrity Check on Ground All ground‑based navigation aids at IGI must perform self‑diagnostic tests. 48 hours DGCA‑approved validation software.
Directive 04 – Report Anomalies to DGCA Cyber‑Security Cell Any unexplained GPS deviation must be reported via the Aviation Incident Reporting System (AIRS). Ongoing Real‑time electronic submission.

How Pilots and Airlines Can mitigate GPS Spoofing Risks

  • Maintain Redundant Navigation Sources
  • Keep VOR, ILS, and RNAV waypoints active as cross‑reference tools.
  • Regularly calibrate INS against known ground stations.
  • adopt Real‑Time GNSS Integrity Monitoring
  • Deploy Receiver Autonomous Integrity Monitoring (RAIM) software.
  • Use Multi‑Frequency GNSS receivers capable of detecting signal inconsistencies.
  • Implement Operational SOPs for Spoofing Suspicion
  1. Verify altitude and heading against ATC clearance.
  2. If discrepancy exceeds 30 meters, inform the tower and request alternative navigation guidance.
  3. Log the event in the aircraft’s flight log and submit an AIRS report within 2 hours.
  • Collaborate with Air Traffic Control (ATC)
  • ATC should broadcast “GNSS anomaly” alerts on the Common Traffic advisory Frequency (CTAF).
  • Provide alternate vectoring using radar‑based separation untill GNSS integrity is restored.

Impact on flight Operations and Passenger Experience

  • Flight Delays – Average delay increase of 12 minutes for inbound flights during the incident window.
  • Airline Cost Implications – Estimated additional fuel consumption of 0.8 % per affected flight due to non‑optimal routing.
  • Passenger Dialog – Airlines adopted proactive messaging through mobile apps, citing “navigation safety precaution” to maintain openness.

regulatory Response and International Coordination

  • DGCA’s Immediate Policy Review – Drafting of a new “GNSS Threat Management Framework” aligned with ICAO Annex 10‑4.
  • Joint Task Force with Ministry of Home Affairs – Deployment of spectrum monitoring units to detect unauthorized GNSS emitters.
  • Collaboration with Global Aviation Bodies – Data shared with the International Civil Aviation Institution (ICAO) and the European Aviation safety Agency (EASA) to refine global spoofing detection protocols.

Case Study: Triumphant Mitigation on Flight AI‑762

  • Scenario – On 22 Nov 2025,AI‑762 (Air India) reported a 45‑meter eastward shift in GPS data at 07:12 UTC.
  • Action Taken
  1. Pilots switched to INS mode per Directive 01.
  2. ATC provided VOR‑based vectors to runway 28L.
  3. Flight landed safely with no passenger impact.
  4. Outcome – The incident was logged, and the airline’s post‑flight audit confirmed compliance with all DGCA safety directives.

Practical Tips for Airport Authorities

  • Deploy GNSS Jamming Detectors – Install fixed-spectrum sensors around the airport perimeter to identify abnormal signal patterns.
  • Conduct Regular Spoofing Drills – Simulate GNSS attacks quarterly to test crew readiness and ATC response.
  • Educate Ground Staff – provide briefings on recognizing GNSS anomalies in ground‑based equipment such as baggage handling systems and airport vehicles.

Future Outlook: Strengthening GNSS Resilience in Indian aviation

  • Transition to Multi‑Constellation GNSS – Incorporate Galileo, GLONASS, and BeiDou alongside GPS to reduce single‑system vulnerability.
  • Invest in Satellite‑Based augmentation Systems (SBAS) – Expand the Indian Regional Navigation Satellite System (IRNSS) augmentation network for enhanced integrity monitoring.
  • Legislative action – Proposed amendment to the Aviation (prevention of Unsafe Acts) Act to criminalize purposeful GNSS spoofing with penalties up to five years imprisonment.

Sources: Directorate General of civil Aviation (DGCA) Safety Bulletin 2025‑11, ICAO GNSS Security Guidelines 2024, Air India Operational Report AI‑762, Ministry of Home Affairs Spectrum Monitoring Unit Press Release (23 Nov 2025).

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Adblock Detected

Please support us by disabling your AdBlocker extension from your browsers for our website.