Morning Overview

Analysts track tanker GPS spoofing surge in the Strait of Hormuz

Every day, roughly a fifth of the world’s seaborne oil passes through a corridor barely 21 nautical miles wide at its narrowest point. The Strait of Hormuz has long been a flashpoint for military tensions, but a quieter threat has been escalating there: someone is feeding false GPS coordinates to tanker navigation systems, and researchers say they can now detect these deceptions at scale.

Two independent research teams have published automated frameworks capable of sifting millions of vessel-tracking records to identify coordinated GPS spoofing events. Meanwhile, the U.S. Maritime Administration has formally warned the shipping industry that the strait is a recurring hotspot for such interference. Together, these developments mark a shift from anecdotal mariner complaints to systematic, data-driven surveillance of a problem that could put supertankers on the wrong side of a shipping lane.

How spoofing works and why it matters here

GPS spoofing differs from jamming in a critical way. Jamming floods a receiver with noise, knocking out the signal entirely. A bridge crew knows immediately that something is wrong. Spoofing, by contrast, feeds a receiver plausible but false coordinates. The ship’s electronic chart still shows a position fix, the autopilot still follows a track, and the crew may have no reason to suspect the data is wrong until a visual bearing or radar return contradicts what the screen displays.

“You look at the chart and everything appears normal,” said Dana Goward, president of the Resilient Navigation and Timing Foundation and a former senior Coast Guard official. “That is what makes spoofing so insidious. The crew has no immediate cue that they are being lied to by their own instruments.”

In the Strait of Hormuz, where inbound and outbound tanker lanes are separated by a two-mile-wide buffer zone and traffic density is among the highest anywhere on the ocean, even a small position error can push a vessel into oncoming traffic or toward shallow water. The strait handles an estimated 20 to 21 million barrels of crude oil per day, according to the U.S. Energy Information Administration, making any disruption to safe navigation a concern that extends well beyond the bridge of a single ship.

New detection tools pull patterns from AIS data

Ships broadcast their GPS-derived position, speed, and heading through the Automatic Identification System, a transponder network originally designed for collision avoidance. When a vessel’s GPS receiver is spoofed, those AIS broadcasts carry the false coordinates, effectively turning the global vessel-tracking network into a sensor for interference events.

A research framework known as SeaSpoofFinder, described in a preprint published on arXiv, exploits that relationship. It flags anomalies in AIS position reports and then applies filtering to distinguish coherent spoofing signatures from routine data glitches, such as transmission dropouts or encoding errors, that can mimic interference if not properly excluded. The result is a method that can scan large datasets and isolate clusters of vessels whose reported positions deviate in ways consistent with a shared, external manipulation of GPS signals.

A second preprint extends that approach with a multi-stage classification pipeline combining rule-based diagnostics, kinematic consistency checks, and spatiotemporal clustering. This system not only flags anomalies but attempts to categorize them as spoofing or jamming, a distinction that matters operationally because the two threats demand different responses from crews and traffic managers. Neither paper has yet undergone formal peer review, but both describe original methods tested against real AIS records and detail how false positives are identified and excluded.

“What these frameworks give us is the ability to move from one-off reports to a wide-area picture,” said Todd Humphreys, a professor of aerospace engineering at the University of Texas at Austin who has published extensively on GNSS vulnerabilities. “Instead of waiting for a captain to call in a disruption, you can see the interference footprint across an entire strait in near-real time.”

U.S. government confirms the geographic pattern

The strongest official confirmation comes from MARAD advisory 2023-005, issued through the Maritime Security Communications with Industry program. The advisory summarized reported GPS interference and AIS spoofing patterns across multiple regions and explicitly named the Strait of Hormuz as a recurring area for disruptions. It urged ship operators to cross-check electronic navigation with visual and radar cues and to report suspected interference promptly.

That advisory, published in 2023, remains the most recent unclassified U.S. government statement on the issue as of spring 2026. No updated public bulletin from MARAD covering the period since has appeared in available reporting, which means the present-tense framing of a “surge” rests partly on the trajectory the advisory described and partly on the analytical capability the newer research preprints demonstrate. Internal government assessments may well have evolved, but outside observers cannot track whether interference has intensified, stabilized, or declined without a fresh public release.

Mariner reports feed into the Coast Guard Navigation Center, which is understood to accept GPS disruption reports from mariners, and the FAA collects parallel reports from the aviation side. These channels give analysts a baseline of human-verified disruption events against which algorithmic detections can be calibrated. When an AIS-based tool flags a suspected spoofing cluster, investigators can check whether crews in the same area filed reports of erratic positioning or signal loss during the same window.

What remains out of reach

Attribution is the most conspicuous gap. The research papers and government advisories describe what is happening and where, but none of the publicly available sources identify who is responsible. No declassified U.S. intelligence report names a state or non-state actor behind the interference. Iranian authorities, whose coastline forms the strait’s northern shore, have not released public statements confirming or denying involvement. Gulf Arab states on the southern side have been similarly silent. On the basis of open-source evidence alone, the question of origin remains unanswered.

Quantifying the trend is nearly as difficult. The MARAD advisory describes recurring patterns, and the detection frameworks are built to identify surges, but neither source publishes a specific incident count over a defined period. Raw disruption logs from the Navigation Center are not publicly available in disaggregated form, so independent researchers cannot verify how many discrete events have been recorded in the strait versus other waterways. That makes it impossible, from open sources, to say with precision whether interference has doubled, tripled, or followed some other curve.

“We know the problem is real and we know roughly where it is concentrated,” said Goward. “What we do not have is a public ledger that lets you count events month by month and assign blame. That gap matters because it limits accountability.”

The downstream consequences are similarly undocumented in verified sources. No confirmed near-miss incidents, groundings, or collisions in the strait have been publicly attributed to GPS spoofing. The research preprints focus on detection performance metrics, such as false-alarm rates and clustering accuracy, not on safety or economic outcomes. Maritime insurers and members of the Lloyd’s Market Association Joint War Committee likely monitor these risks, but no specific premium adjustments or case studies tied to spoofing in the strait appear in the available evidence base. Discussion of operational risk therefore remains qualitative: experts can say spoofing raises the probability of navigation errors in a congested chokepoint, but they cannot yet point to a confirmed casualty count.

Detection capability outpaces public transparency on Hormuz spoofing

Taken together, the picture as of spring 2026 is one of growing analytical capability layered over a confirmed but incompletely documented threat. Researchers have demonstrated that large-scale spoofing detection through AIS data is technically feasible. The U.S. government has confirmed that the Strait of Hormuz is a persistent interference zone. What is still missing is the connective tissue: granular, time-stamped incident data that would let analysts chart the trend precisely, attribution that would identify the actors involved, and outcome data that would quantify the safety and economic toll.

For tanker operators, the practical takeaway has not changed much since MARAD issued its 2023 guidance: cross-check GPS with radar and visual bearings, report anomalies through official channels, and treat electronic position data in the strait as potentially unreliable. For analysts and policymakers, the new detection tools offer something more consequential. They provide, for the first time, a scalable method to monitor interference patterns across an entire waterway rather than relying solely on individual mariner reports. Whether that capability translates into deterrence, enforcement, or simply better situational awareness will depend on decisions that have not yet been made public.

More from Morning Overview

*This article was researched with the help of AI, with human editors creating the final content.