HahahYou guys believe that?
GPS spoofing is not easy even in laboratory settings and extremely unlikely for a mobile target that also happens to be a military asset in the midst of a mission, specially with single attempt:
3). GPS spoofing has been considered for years and the concept has been proven. On the ground. In a controlled lab environment. Spoofing a stationary receiver to believe it was located at a different stationary position. And even this is incredibly complex. However, spoofing a moving target is orders of magnitude more difficult as it requires multiple successful “stationary spoofs” per second while not losing lock, confusing, or alerting the target receiver to anomalies. Spoofing a moving aircraft at 30, 40, or 50,000+ feet traveling at 300, 400, 0r 500+ MPH is several more orders of magnitude difficult. It is unlikely that ground-based antennas (even highly directional ones) could do the trick; the spoofing equipment would need to be airborne flying near the drone. GPS is all about very precise timing; minor timing variations result in miles of error. So the “chase plane” would need to hold a fixed differential position to within inches of a moving aircraft.
4). The military uses a very different GPS system than the one on your dashboard in your car. The military GPS signals are encrypted and authenticated. An attacker is theoretically not able to generate valid military GPS signals; all he could do is to capture and replay existing signals and adjust the transmission timing. Which is extremely difficult to get right given that the satellite relative positions are constantly changing even if the target is stationary; a moving target is even more complex.
Full reading here: https://www.jasadvisors.com/iran-hijacked-us-rq-170-sentinel-drone-with-gps-hack-not-likely/
Most likely scenario is that that drone malfunctioned during its mission in Iran. It is a machine after-all.