Python tools to download JSON files from rfi.stanford.edu.
Project description
GNSS Interference Monitoring Data Download Tool
This repository contains the source code for the Python package <rfi_fileparser>, which provides utilities to download and visualize JSON files from the GNSS Interference Monitoring Website: http://rfi.stanford.edu/. Users can specify a start date, end date, and data type (jamming, spoofing, or dashboard).
Installation
Prerequisites
- Python 3.8+ installed
Setup
pip install rfi-fileparser
Update periodically to get the latest features:
pip install --upgrade rfi-fileparser
Usage
Download JSON data
from rfi_fileparser import downloader
downloader.download_files("2025/04/23", "2025/04/26", "dashboard")
downloader.download_files("2025/04/23", "2025/04/26", "jamming")
downloader.download_files("2025/04/23", "2025/04/26", "spoofing")
- HTTPS warnings may appear; these are safe and result from bypassing certificate checks.
- Downloading one week of all data types may take a few minutes.
- Files are saved under the directory
downloaded_json_files/in the current working path.
Visualize heatmaps
from rfi_fileparser import plot_daily_heatmap, plot_hourly_heatmap
plot_daily_heatmap("downloaded_json_files", "2025/04/24")
plot_hourly_heatmap("downloaded_json_files", "2025/04/24")
Visualize events
from rfi_fileparser import plot_jamming, plot_spoofing
plot_jamming("downloaded_json_files", "2025/04/24")
plot_spoofing("downloaded_json_files", "2025/04/24")
Data Structure
.downloaded_json_files/
├── dashboard
│ ├──general.json
│ └── 2025
│ └── 04
│ └── statistics.json
├── jamming
│ └── 2025
│ └── 04
│ └── 24
│ ├── events.json
│ ├── heatmap.json
│ ├── 0000
│ │ └── heatmap.json
│ ├── 0100
│ │ └── heatmap.json
│ └── ...
└── spoofing
└── 2025
└── 04
└── 24
├── beforeAndDuringSpoofing.json
├── duringAndAfterSpoofing.json
├── events.json
└── heatmap.json
Data Information
1. jamming/2025/04/24/heatmap.json
→ Daily heatmap data.
2. jamming/2025/04/24/0000/heatmap.json
→ Hourly heatmap data.
-
h3Index: Unique index for each hexagonal cell (H3 system). Use it to get hexgaon boundaries in Python:from h3 import h3 from shapely.geometry import Polygon def h3_to_polygon(h3_index): boundary = h3.h3_to_geo_boundary(h3_index, geo_json=True) return Polygon(boundary)
(Functions for this are included in the GitHub repository.)
-
lowQualityCountandtotalAircraftCount: Number of low NIC / total aircraft seen within that hexagonal cell.
3. jamming/2025/04/24/event.json
→ All jamming events detected on that day.
latitudeandlongitude: Centroid location of each jamming event.startTimeandendTime: Start and end times of each jamming event.
4. spoofing/2025/04/24/beforeAndDuringSpoofing.json
→ For each spoofing event, shows the last known normal position and the first spoofed position observed for each affected flight.
beforeSpoofing: Last known normal positionspoofedInto: First spoofed position
Example:
{
"event_1": [
{
"beforeSpoofing": {
"lat": 53.1131,
"lon": 49.9999,
"alt": 9098.28,
"nic": 7,
"time": 1740858262.297
},
"spoofedInto": {
"lat": 53.102,
"lon": 49.9545,
"alt": 9098.28,
"nic": 0,
"time": 1740859918.787
},
},
...
],
...
}
5. spoofing/2025/04/24/duringAndAfterSpoofing.json
→ For each spoofing event, shows the last spoofed position and the first normal position after recovery.
spoofedInto: Last spoofed positionafterRecovering: First normal position after spoofing
Example:
{
"event_1": [
{
"spoofedInto": {
"lat": 53.101,
"lon": 49.9843,
"alt": 9098.28,
"nic": 0,
"time": 1740867858.763
},
"afterRecovering": {
"lat": 51.7174,
"lon": 55.0444,
"alt": 9098.28,
"nic": 0,
"time": 1740868558.257
}
},
...
],
...
}
6. spoofing/2025/04/24/event.json
→ All spoofing events detected on that day.
latitudeandlongitude: Centroid location of each spoofing event.startTimeandendTime: Start and end times of each spoofing event.
7. spoofing/2025/04/24/heatmap.json
→ Daily heatmap of spoofing-affected region.
-
h3Index: Unique index for each hexagonal cell (H3 system). (See usage example above underjamming/2025/04/24/0000/heatmap.json.) -
spoofedFlightCount: Number of affected aircraft within each cell, based on interpolated true paths. -
seenAircraftCount: Number of unaffected aircraft in the same cell, based on ADS-B data.
Example:
{
"event_1": [
{
"h3Index": "841f533ffffffff",
"spoofedFlightCount": 2,
"seenAircraftCount": 26
},
{
"h3Index": "841f53bffffffff",
"spoofedFlightCount": 3,
"seenAircraftCount": 19
},
...
],
...
}
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file rfi_fileparser-0.6.2.tar.gz.
File metadata
- Download URL: rfi_fileparser-0.6.2.tar.gz
- Upload date:
- Size: 9.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.9.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
c6949e946c8ca419617a346d846de3bab24c94af83ed260ddcf2ad53188a8c41
|
|
| MD5 |
3d984f7b33a8db25f7c2c8150cde8be0
|
|
| BLAKE2b-256 |
d3e3cd787789fa390eedd4556944d90a9f9bfcbb1fbd65a5b1d1d8cfaa3b3e77
|
File details
Details for the file rfi_fileparser-0.6.2-py3-none-any.whl.
File metadata
- Download URL: rfi_fileparser-0.6.2-py3-none-any.whl
- Upload date:
- Size: 13.1 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.9.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
0a663fbde20dbe78daa5fd8be1087ce95739de4b623f04cb82de90e6165b5575
|
|
| MD5 |
f702fa6c4f87e4aa8f8c78ab75a5c697
|
|
| BLAKE2b-256 |
cb719721b294f9f77a014b464c742dfe6217375fa4aa5648210c80fb6ac3fff7
|