<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1d1 20130915//EN" "JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">SDQ</journal-id><journal-title-group><journal-title>Security &amp; Defence Quarterly</journal-title><abbrev-journal-title>SDQ</abbrev-journal-title></journal-title-group><issn pub-type="epub">2544-994X</issn><issn pub-type="ppub">2300-8741</issn><publisher><publisher-name>Akademia Sztuki Wojennej</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">SDQ-46-00313</article-id><article-id pub-id-type="doi">10.35467/sdq/178249</article-id><article-categories><subj-group subj-group-type="heading"><subject>RESEARCH PAPER</subject></subj-group></article-categories><title-group><article-title>Aircraft vulnerability to politically motivated Radio Frequency Interference (RFI) in Eastern Europe</article-title></title-group><contrib-group content-type="authors"><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-9889-3673</contrib-id><name><surname>Westbrook</surname><given-names>Tegg</given-names></name><email>teggwestbrook@gmail.com</email></contrib><aff id="aff1">Department of Safety, Economics, and Planning, University of Stavanger, Kjell Arholms Gate 41, 4021, Stavanger, Norway</aff></contrib-group><pub-date pub-type="epub"><day>09</day><month>02</month><year>2024</year></pub-date><volume>46</volume><issue>1</issue><fpage>1</fpage><lpage>14</lpage><history><date date-type="received"><day>15</day><month>09</month><year>2023</year></date><date date-type="rev-recd"><day>03</day><month>01</month><year>2024</year></date><date date-type="accepted"><day>04</day><month>01</month><year>2024</year></date></history><permissions><copyright-statement>© 2024 T. Westbrook published by War Studies University, Poland.</copyright-statement><copyright-year>2024</copyright-year><license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0"><license-p>This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (<ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/">http://creativecommons.org/licenses/by/4.0/</ext-link>).</license-p></license></permissions><abstract><p>Countries in Europe have experienced radio frequency interference from Russian electronic warfare units, affecting navigation systems without discrimination. Interference has been identified as coming from the Russian mainland, Kaliningrad, and in the areas where it is engaged in conflicts abroad, creating serious hazards for aircraft. Previous research has identified the technical vulnerabilities to aviation from radio frequency interference, but it has yet to be contextualised in light of the ongoing geopolitical tensions. Using literature review analysis, the aim of the article is to place the jamming and spoofing threat in the context of ongoing political tensions between Russia and the region and to establish worse-case scenarios based on the former’s motives. Focusing on the threats to aircraft, it finds that the likely motivations are to (1) complement political narratives of Western aggression; (2) to deny service for intimidation, harassment, economic loss, and to portray a dominant Russian cyber influence; and (3) to use spoofing to enable hostage diplomacy via the seizure of people and assets. It argues that reporting mechanisms for aviation risks assumes geographical staticism, which does not correspond adequately to the threat. It also creates arbitrary “predictability” in otherwise unpredictable environments, which could ultimately affect vigilance and due diligence in the areas not considered problematic.</p></abstract><kwd-group><kwd>electronic warfare</kwd><kwd>cyber security</kwd><kwd>geopolitics</kwd><kwd>satellite navigation systems</kwd></kwd-group></article-meta></front><body><sec id="S1" sec-type="intro"><title>Introduction</title><p>Russia’s invasion of Ukraine has pulled the world back to the early 20th century thinking about international relations, revitalising largely outdated notions of pure realism. The ongoing tensions between North Atlantic Treaty Organization (NATO) and Russia are dynamic and could change at a moment’s notice as a result of miscalculating and misreading intentions. The electronic warfare (EW) technologies at states’ disposal threaten both civilian and military systems, and the separation between critical civilian functions and their protection from military activity are becoming harder to achieve.</p><p>Russia possesses a range of EW equipment that includes jamming and spoofing technologies and has used them consistently and indiscriminately against civilian users of the Global Navigation Satellite System (GNSS) outside or within intra- and interstate conflicts. Navigational functions on aircraft have been consistently affected by Russian jamming. Radio frequency jamming denies service to users, including critical location information. Spoofing creates misleading location information, which poses a more serious problem for aviation, particularly in poor weather conditions, at night time, in busy skies, and when flying near precarious borders.</p><p>Radio frequency interference (RFI) has an impact on network efficiency, cost effectiveness, undermines trust in the GNSS, and adds additional financial burden for operators having to invest in security measures (Eurocrontrol, 2021). Challenges posed as a result of RFI are the possible misdirection of civilian users, which is especially precarious in the aviation sector. This could lead to major civilian casualties and also create potential escalation between Russia and the West. In aviation, where ground- and satellite-based signals are used for navigation purposes, it is important to consider the consequences resulting from RFI from a geopolitical perspective.</p><p>RFI is used defensively and offensively in different scenarios, affecting civilian and military aircraft, and often the interference can be attributed to intentional interference, collateral interference to civilian systems in conflict areas, or in non-combat situations (hereafter, conceptual clarifications are not always explicated). Since 2016, denial of service RFI has been used to conceal the true locations of key Russian officials and Russian military units, which has affected all constellations (even Russia’s own GLONASS) (<xref ref-type="bibr" rid="ref51">Westbrook, 2023a</xref>, p. 76). A massive rise in GNSS RFI incidents was identified in 2018, where 38.5% of European en-route air traffic operating through the region was regularly affected by RFI. In fact, 5% of this traffic in the designated “disruption zones” was considered needing special assistance due to the increase in potential pilot and controller workload (<xref ref-type="bibr" rid="ref34">Mishra, 2022</xref>, slide 3). In 2021, it was cited that there had been a 2000% increase in GNSS RFI incidents since 2018, according to the voluntary incident reporting mechanism (<xref ref-type="bibr" rid="ref19">Goward, 2023</xref>). In 2019 alone, there were up to 10,000 jamming and spoofing events, affecting aviation systems beyond Russia’s borders (<xref ref-type="bibr" rid="ref44">StrategyPage, 2019</xref>; <xref ref-type="bibr" rid="ref51">Westbrook, 2023a</xref>). Since February 2022, indiscriminate jamming within and outside Russian territory has intensified. While its military utility is widely documented, it has yet to be known how the tactical use of RFI against aircraft could further Russia’s political aims.</p><p>Taking inspiration from a taxonomy of jamming and spoofing tactics (<xref ref-type="bibr" rid="ref52">Westbrook, 2023b</xref>), and considering previous incidents of RFI (not just relating to Russia), the aim of the article is to place the jamming and spoofing threat in the context of ongoing political tensions between Russia and the region, and to establish worse-case scenarios based on the former’s motives. The article explores how intentional and collateral RFI could lead to catastrophic unintentional events. In extreme cases, RFI could accidentally prompt military responses from NATO or Russia, leading to potential escalation.</p><p>The article first explores how RFI has affected aircraft in Europe, drawing on previous military exercises and local RFI documented by the media and pilot reports. It considers patriot hackers, cyber mercenaries, and Russian military units as the main threats. It then critiques the suitability of the European Union Aviation Safety Agency’s (EASA) Information Sharing and Cooperation Platform on Conflict Zones (<xref ref-type="bibr" rid="ref16">2022d</xref>). It follows by exploring the specific vulnerability of aircraft, particularly the Automatic Dependent Surveillance–Broadcast (ADS-B) and the Instrument Landing System (ILS), and what the motives might be behind that interference. Following a thematic overview of political motivations, the conclusion argues that collateral or intentional RFI could purposely or indeed inadvertently escalate tensions between Russia and the West due to the potential of fabricating data, or opposing parties misinterpreting or miscalculating intentions based on those fabrications, putting lives and aviation safety at risk.</p><p>The methodology involved a literature review mapping the EW activities in the region and how they have affected military and civilian use of the GNSS. Using existing primary and secondary data identifying both real and hypothetical risk to aviation (from other case examples not involving Russia), the data was arranged into themes relating to the possible means–ends objectives of Russian units and sympathetic non-state actors. The study also used taxonomy of spoofing and jamming tactics to inform new critical thinking about scenarios that might manifest themselves.</p></sec><sec id="S2"><title>Background</title><sec id="S2_1"><title>The Russian invasion of Ukraine and cyber and RFI threats in Europe</title><p>Europe shares thousands of kilometres of borders and seaways with Russia and Belarus, and is facing threats of invasion. Billions of Euros in trade rely on secure land, sea, and air navigation. Some Eastern European states, with western allies, support Ukraine financially and with weapons, imposing sanctions and flight restrictions (<xref ref-type="bibr" rid="ref11">European Commission, 2022</xref>). North, east, and southeast Europe, along with the Arctic, frequently experience Russian jamming and spoofing (<xref ref-type="bibr" rid="ref48">US Department of Transportation Maritime Administration, 2022</xref>).</p><p>In response to Russian EW actions in Ukraine, Europe's aviation authority warns of GNSS issues affecting GPS and Galileo users (European Union Aviation Safety Agency <xref ref-type="bibr" rid="ref13">[EASA], 2022a</xref>, p. 2). Russian RFI, spanning from Varanger to Kaliningrad and the Kola Peninsula, has disrupted aviation systems and airports, leading to cancelled flights (<xref ref-type="bibr" rid="ref38">Nilsen, 2022b</xref>). These incidents are becoming more frequent and prolonged (<xref ref-type="bibr" rid="ref37">Nilsen, 2022a</xref>) and even affectair ambulance services.</p><p>RFI has various criminal and military uses, including Russia supplying non-state actors in Ukraine (<xref ref-type="bibr" rid="ref40">Patrick, 2015</xref>, <xref ref-type="bibr" rid="ref41">2016</xref>; <xref ref-type="bibr" rid="ref50">Westbrook, 2019b</xref>, p. 6). Homemade jamming systems, including legacy Soviet technology, water pumps, copper pipes, and electromagnetic emitters, pose aviation risks (<xref ref-type="bibr" rid="ref45">The Associated Press, 2011</xref>, p. 3). Off-the-shelf jamming and spoofing devices are accessible and concealable, from miniaturised versions to backpack-sized equipment (<xref ref-type="bibr" rid="ref50">Westbrook 2019b</xref>, p. 9).</p><p>States may use ‘cyber mercenaries’ covertly for offensive or defensive purposes, targeting emergency responders, port operators, and airliners (<xref ref-type="bibr" rid="ref52">Westbrook, 2023b</xref>). Patriot -hackers and cyber mercenaries, often limited to civilian systems, are much less sophisticated than state militaries (<xref ref-type="bibr" rid="ref51">Westbrook, 2023a</xref>, p. 86). Russian EW units possess advanced EW -technologies and trade with other countries (Iran, possibly China).Coordination among aviation authorities is emerging to tackle the growing RFI problem, despite the challenges posed by diverse attack methods and attackers (<xref ref-type="bibr" rid="ref52">Westbrook, 2023b</xref>).</p></sec><sec id="S2_2"><title>What is Europe doing?</title><p>As a result of interference from civilian and military users, in recent years there has been a stronger international urge for action from the likes of the International Air Transport Association (IATA) and the U.N.’s International Civil Aviation Organisation (ICAO), among others (<xref ref-type="bibr" rid="ref19">Goward, 2023</xref>). In terms of restrictions on trade, the European Union (EU) and United Kingdom have adopted a number of bans of exports on goods, technology, and technical assistance targeting the Russian aviation sector (<xref ref-type="bibr" rid="ref15">EASA, 2022c</xref>; <xref ref-type="bibr" rid="ref47">UK Government, 2023</xref>). Following a number of serious aviation incidents after Russia’s annexation of Crimea in 2014, the EU, for example, has developed common rules in reporting civil aviation safety hazards (although this was planned before the invasion happened; <xref ref-type="bibr" rid="ref12">European Parliament, Council of the European Union, 2014</xref>). As a result of increase in interference since 2022, the <xref ref-type="bibr" rid="ref14">EASA (2022b)</xref>, using data from network of analysts and open sources, has issued information about affected regions and a European information sharing and cooperation platform on conflict zones. The aim of the platform is to enable domestic operators to carry out risk assessments based on events experienced by other operators. Safety information bulletin warnings communicating increased probability of issues with GNSS interference are shared. Unlike the equivalent US reporting systems (<xref ref-type="bibr" rid="ref3">Aviation Safety Reporting System (ASRS), 2023</xref>), the reporting mechanism is not open access to independent observers, but only to commercial air operators within the EASA. The information is not distributed in real time based on current events, and has little context about the motivations for why RFI might be used.</p><p>The reporting mechanism also assumes that RFI is a static problem confined to geographical locations. This may lead to interference being shrugged off as blips in the areas considered safe. Indeed, it assumes a level of predictability in problem areas which may lead to lack of vigilance in non-problem areas. Due to the new “normality” of frequent and prolonged RFI, interference may be treated with less due diligence as “passive alarms” that are not serious enough to warrant more action. RFI can come from the ground, from other aircraft, people onboard aircraft, or from devices within or attached to aircraft. Finally, the inadequate sharing of data to other interested parties gives observers a narrow picture that produces conjecture and redundancy, rather than objective and evidence-based analysis and response to the full risk situation.</p></sec><sec id="S2_3"><title>Why is RFI Specifically Dangerous for Aviation?</title><p>Many aircraft, including manned and unmanned aerial vehicles, rely on the position, timing, and navigation information provided by the GNSS and other navigations aids. While all aircraft are vulnerable to RFI, smaller aviation users are at the highest risk, because many of these aircraft use consumer-grade GPS receivers (<xref ref-type="bibr" rid="ref19">Goward, 2023</xref>), and do not have the additional navigation aids that large commercial aircraft typically have.</p><p>There are many different navigation aids built into various aircraft, and many studies have demonstrated that a number of aviation systems are vulnerable to attacks (<xref ref-type="bibr" rid="ref43">Sathaye <italic>et al</italic>., 2019</xref>). The Automatic Dependent Surveillance–Broadcast (ADS-B), for example, enables pilots and other observers to identify where (most) other aircraft are at any given time. In some cases, ADS-B is used as a sole means of position information and surveillance of other aircraft when the level of service is low. In the current literature exploring technical vulnerabilities of navigation systems in aircraft and supporting infrastructure (e.g. <xref ref-type="bibr" rid="ref6">Costin and Francillon, 2012</xref>; <xref ref-type="bibr" rid="ref30">Kožović and Đurđević, 2019</xref>, <xref ref-type="bibr" rid="ref31">2021</xref>; <xref ref-type="bibr" rid="ref43">Sathaye <italic>et al</italic>., 2019</xref>; <xref ref-type="bibr" rid="ref29">Khan <italic>et al</italic>., 2021</xref>), there have been numerous problems identified with ADS-B. This includes injecting non-existing aircraft by spoofing ADS-B messages, and modifying the route of an aircraft by jamming and replacing the ADS-B signals. ADS-B has been criticised for lacking the minimal and necessary mechanisms, including entity authentication, message encryption, and vulnerability to tampering (<xref ref-type="bibr" rid="ref6">Costin and Francillon, 2012</xref>, p. 1), among other things (<xref ref-type="bibr" rid="ref2">Alohali, 2019</xref>).</p><p>For landing purposes, aircraft may use the Instrument Landing System (ILS) to navigate a plane’s position in relation to the runway. It has been identified that ILS is vulnerable to so-called overshadow attacks, which is where an attacker can transmit signals that overpower the ILS signals (<xref ref-type="bibr" rid="ref43">Sathaye <italic>et al</italic>., 2019</xref>, p. 361). Other types of attacks, such as those against signal generation, can “cause deflections in the course deviation indicator needle” (<xref ref-type="bibr" rid="ref43">Sathaye <italic>et al</italic>., 2019</xref>, p. 359). The seriousness of the problem can depend on the location, the duration, the phase of the flight, and environmental conditions. If such systems are affected, pilots usually resort to other navigational cues and detection systems, but when such alternatives are not available, or degraded, it could lead to serious hazards.</p><p>Some instances of accidental military jamming gives us an idea of the potential harm it can do to civilian systems if/when used in an indiscriminatory manner (<xref ref-type="bibr" rid="ref21">Harris, 2021</xref>), and the impacts are not just felt by aviation systems. Numerous hazards have been reported from anonymous pilots in the United States, ranging from airspace violations and near collisions to landing at the wrong airport as a result of jamming and spoofing (<xref ref-type="bibr" rid="ref35">National Aeronautics and Space Administration [NASA], 2022</xref>). The Institute of Electrical and Electronics Engineers (IEEE) spectrum has also documented “173 instances of lost or intermittent GPS during a six-month period of 2017 and another 60 over two months in early 2018” because of accidental military jamming. The data they found show aircraft flying off-course, accidentally entering military airspace, being unable to manoeuvre, and losing their ability to navigate when close to other aircraft. Many pilots required the assistance of air traffic control to continue their flights. The affected aircrafts included a pet rescue shuttle, a hot-air balloon, multiple medical flights, and many private planes and passenger jets (<xref ref-type="bibr" rid="ref21">Harris, 2021</xref>).</p><p>Flight deviations and airspace violations as a result of suspected GPS jamming and spoofing have been reported frequently from anonymous pilots, some of which have been tied to military training activities (<xref ref-type="bibr" rid="ref35">NASA, 2022</xref>). Reports from 2022 alone indicate altitude deviations, track heading deviations, the GPS going into dead reckoning mode without the pilot noticing, and very near airspace violations due to incorrect GPS readings (<xref ref-type="bibr" rid="ref35">NASA, 2022</xref>). Some reports indicate how GPS interference distracts pilots, some already fatigued after long flights, and leads them to inadvertently violating airspace. In 2019, a commercial passenger aircraft, having relied on GPS through the mountainous approach in the Sun Valley in Idaho, deviated off course due to low-level inference. The aircraft was reportedly saved by an attentive radar controller, saving the lives of all on board (<xref ref-type="bibr" rid="ref19">Goward, 2023</xref>).</p><p>In extreme circumstances, distractions and deviations could mean relying on limited fuel reserves, and for sleep-deprived pilots on long-haul flights with limited resting periods, it could lead to more serious mistakes. Deviations into countries experiencing conflict, such as Russia, Belarus, and Ukraine, could result in the plane being misidentified, as indicated by the <xref ref-type="bibr" rid="ref14">EASA (2022b)</xref>.</p><p>There has been a speculation about spoofing, leading to the tragic Malaysia Airlines Flight MH370 disaster in 2014 (<xref ref-type="bibr" rid="ref53">Wise, 2019</xref>; <xref ref-type="bibr" rid="ref42">Rietjens, 2019</xref>) which probably deviated from its North-East flight path from Kuala Lumpur to Beijing and was last picked up by military radar heading North-West towards the Indian Ocean. It has been suggested by some national authorities that the flight path could have been altered by an employee, but there has been no conclusive evidence.</p><p>All in all, these examples demonstrate how indiscriminate or targeted attacks against aircraft are worthy of specific analysis in political sciences. Hereafter, drawing on various related and unrelated incidents, the tactical and politically motivated attacks are arranged into hypothetical categories.</p></sec></sec><sec id="S3" sec-type="results"><title>Results</title><sec id="S3_1"><title>RFI to complement political narratives of Western aggression</title><p>One main concern about RFI is the potential that actors could spoof aircraft into Russian airspace in real terms but also via pilot’s and observer’s digital interfaces. Russia has consistently used alternative media narratives to justify its unprovoked invasion of Ukraine. These narratives are targeted towards its own population and populations of sympathetic states. Where spoofing of aircraft could aid such narratives, in the taxonomy of RFI tactics (<xref ref-type="bibr" rid="ref52">Westbrook, 2023b</xref>, p. 73), one such strategy of decoy spoofing could fit into such motives. Used primarily to trick other users into an action desirable to the attacker, the same strategy could be used to give the impression that NATO aircraft have been intruding into Russian or Belarussian airspace.</p><p>Concerns about the vulnerability of ADS-B bare similar risks in terms of “digital intrusions” into territories. Following 9/11, it was found that hackers could easily introduce as many as 50 false targets onto controllers’ radar screens (<xref ref-type="bibr" rid="ref32">McCallie, 2011</xref>, p. 17). Two researchers spoofed “faked aircraft into the simulated busy airspace over San Francisco.” They found that “[s]poofing a target into the real ADS-B system would be a simple matter of transmitting the signal on the ADS-B frequencies (978 and 1090 MHz)” (<xref ref-type="bibr" rid="ref46">Thurber, 2012</xref>). While such studies indicate a more maligned and destructive motivation, similar strategies could be used to give the impression of airspace violation, or inadvertently influence a pilot to enter airspace to avoid falsified, impending collisions.</p><p>While spoofing can be used to demonstrate western aggression in the digital domain, it can, and has been, used to justify the shooting down of aircraft. In proxy conflicts, such interference is intended for the purpose of testing military systems while not instigating a direct military confrontation. While there are no known instances of military actors targeting civilian aircraft for such purposes, it is worth considering military systems as being ample targets for such political tactics. In the taxonomy, the strategy of <italic>correcting</italic> or -<italic>following crooked</italic> paths (<xref ref-type="bibr" rid="ref52">Westbrook, 2023b</xref>, pp. 72–73) could provide both explanations for why two US drones were misdirected into Iranian skies. Dana Goward, a commentator on RFI events, noted that the flight was on a routine trip from two different ports off the coast of Saudi Arabia in international airspace. “Somehow [the drone] ended up way to the left, where the Iranian navy just happened to be waiting for them. All of a sudden it’s taking a right-hand turn toward Iran, and getting shot down while it was in their territorial airspace” (<xref ref-type="bibr" rid="ref1">Adde, 2021</xref>). In 2019, then President Donald Trump reportedly “came close to calling for an airstrike against Iran in retaliation” (<xref ref-type="bibr" rid="ref1">Adde, 2021</xref>). Former US Vice President Dick Cheney similarly stated that he supported the option of targeting a captured US <italic>unmanned</italic> aerial vehicle (UAV) that Iran claimed to have captured (expanded later) (<xref ref-type="bibr" rid="ref50">Westbrook, 2019b</xref>, p. 9).</p><p>While correcting or following crooked path attacks could inadvertently lead to military confrontations, indiscriminate jamming and spoofing attacks, such as these, could likewise lead to civilians being accidentally targeted due to incorrect or degraded navigation information. During the Cold War era, passenger flights, such as the London to Tel Aviv El Al Flight 402, strayed into and was subsequently shot down in Bulgarian airspace. The Libyan Arab Airlines Tripoli to Cairo flight LN 114 experienced equipment failure and got lost in the disputed Sinai Peninsular in bad weather. It was shot down. And two Korean Airlines passenger aircraft in 1978 (KAL 902) and 1983 (KAL 007) strayed into Soviet airspace and were shot down. Ironically, such examples were prior to accurate GNSS was a utility available to commercial airliners, but even with GNSS ubiquity, incidents of misidentification occur. In January 2020, Ukraine International Airlines flight PS752 was tragically shot down in Tehran because it was misidentified as a US missile during heightened tensions between the two countries, according to Iran’s armed forces (which previously blamed it as a technical fault; <xref ref-type="bibr" rid="ref20">Gritten, 2023</xref>).</p><p>Indeed, we do not need to look hard for an example of high-grade military equipment being used by non-state actors where a catastrophic incident happened. Although not related to RFI, a notable example includes the downing of Malaysia Airlines Flight 17 in 2014 by pro-Russian separatists in Ukraine using a Russian-supplied Buk surface-to-air missile, resulting in 298 deaths. The aircraft was misinterpreted as a military aircraft. Russia and its media changed their narrative many times but initially insisted that a NATO plane was shot down, then insisting a Ukrainian jet shot at the aircraft. Russian nationals Igor Girkin, Sergey Dubinsky, and Oleg Pulatov, and Ukrainian national Leonid Kharchenko were tried in absentia. Girkin, Dubinsky, and Kharchenko were sentenced to life imprisonment (<xref ref-type="bibr" rid="ref36">Netherlands Prosecution Service, 2021</xref>).</p></sec><sec id="S3_2"><title>Denial of service (DoS) for intimidation, harassment, economic loss, and to portray a dominant Russian cyber influence</title><p>Denial of service is intended to degrade and deny confident use of GPS and other navigation beacons, and potentially destroy the victim’s receivers with strong overpowering signals (<xref ref-type="bibr" rid="ref52">Westbrook, 2023b</xref>, p. 74). Recent papers have focused on the political motives of DoS attacks on the radio spectrum and the state level (<xref ref-type="bibr" rid="ref49">Westbrook, 2019a</xref>, 2023b) and DoS has been linked to the potential indirect loss of life as a result of degrading the ability of emergency services to operate safely (<xref ref-type="bibr" rid="ref21">Harris, 2021</xref>). Some events have been attributed to civilian users using cheap jammers to avert toll payments in Norway and elsewhere (<xref ref-type="bibr" rid="ref17">Gangeskar and Laagstein, 2022</xref>; <xref ref-type="bibr" rid="ref49">Westbrook, 2019a</xref>). It has also been linked to causing economic damage to airports, particularly for civilian users (<xref ref-type="bibr" rid="ref54">Woodrow, 2017</xref>). In all likelihood, there are possibly thousands of such incidents each year worldwide that are not reported openly. Thus, if this can all happen accidentally or unintentionally, what can be done intentionally?</p><p>Russian military DoS has recently been described as “smart jamming” by some commentators (<xref ref-type="bibr" rid="ref5">Center for Advanced Defense Studies (C4ADS), 2019</xref>, p. 9; <xref ref-type="bibr" rid="ref33">Milner, 2020</xref> citing Todd Humphreys), specifying that such jamming can morph into spoofing, giving the pilot hazardously misleading information, instead of direct loss of position information. This smart jamming could mislead a GPS user or system using GPS or ground-based navigation beacons to correct or follow a false velocity reading or direction, thus making them go in the wrong direction because of crooked path attacks (<xref ref-type="bibr" rid="ref52">Westbrook, 2023b</xref>, p. 72). A test undertaken by the University of Texas at Austin found, for example, that inducing a false trajectory reading into a drone could make it try to correct its position, and potentially crash as a result (<xref ref-type="bibr" rid="ref28">Kerns <italic>et al</italic>., 2014</xref>).</p><p>Similar issues have been identified when spoofing the Instrument Landing System (ILS) used for landing planes. Evidently, the RFI at the landing stage could be imposed by (suspected) cell phone towers, or other electromagnetic interference, as was considered in cases in South Korea, the Philippines, Indonesia, and Thailand (<xref ref-type="bibr" rid="ref25">International Civil Aviation Organization, 2018</xref>). In South Korea, of the hundreds of aircraft affected, four missed their approach due to a GPS warning (<xref ref-type="bibr" rid="ref24">International Civil Aviation Organization, 2012</xref>). Such attacks could easily be imposed by low-sophisticated political actors, such as patriot hackers, and thus also potentially by indiscriminate military-grade spoofing.</p><p>It is certainly important to consider the possibility of attacks on the ILS based on other previous operational failures of the system, including the Singapore Airlines flight SQ327 (143 passengers and 15 crew) in 2011, which “unexpectedly banked to the left […] about 30 feet above a runway,” and then “veered to the right, crossed the centreline” at Munich airport in Germany (<xref ref-type="bibr" rid="ref18">Goodwin, 2019</xref>; German Federal Bureau of Aircraft Accident Investigation status report, no date). According to an incident report, “the jet missed its intended touch down point by about 1,600 feet. Investigators said one contributor to the accident was localiser signals that had been distorted by a departing aircraft” (<xref ref-type="bibr" rid="ref18">Goodwin, 2019</xref>). <xref ref-type="bibr" rid="ref18">Goodwin (2019)</xref> also notes other “near-catastrophic accidents involving ILS failures”, including “Air New Zealand flight NZ 60 in 2000 and a Ryanair flight FR3531 in 2013 (<xref ref-type="bibr" rid="ref8">Dutch Safety Board, 2014</xref>). DoS smart jamming could hypothetically replicate what was found with a low-cost spoofing device. Spoofing ILS could “generate what is sometimes called a ‘fly down’ signal that instructs the pilot to steepen the angle of descent, possibly causing the aircraft to touch the ground before reaching the start of the runway.” A pilot could “react by guiding the plane to the right and inadvertently steer over the centreline” (<xref ref-type="bibr" rid="ref18">Goodwin, 2019</xref>; see also <xref ref-type="bibr" rid="ref43">Sathaye <italic>et al</italic>., 2019</xref>).</p><p>The seriousness of such scenarios is heightened in bad weather conditions, in darkness, and at airports where there are high volumes of entering and departing aircraft. For example, the augmented depictions of the vertical path (the glide path) that a plane follows cannot always be visually verified in poor weather. In summary, smart jamming used intentionally to target the ILS could lead to serious hazards in drone operations and for aircraft landings.</p></sec><sec id="S3_3"><title>RFI to enable hostage diplomacy via the seizure of people and assets</title><p>Prolonged and intermittent jamming of civilian areas may bring governments to the negotiation table if the jamming is affecting a nation’s society and the economy, as in the case of North Korea targeting South Korea for an extended number of days in 2012 and thereafter (<xref ref-type="bibr" rid="ref50">Westbrook, 2019b</xref>, p. 5). Jamming could be so severe that commercial aircraft users are forced to land. Such events alone demonstrate how jamming could coerce opposing governments to negotiate matters and enable seizure of assets. Sophisticated and tactical use of GNSS spoofing, particularly crooked path attacks, can also be used as a hybrid warfare tactic by mixing fake news, plausible deniability, and “hostage diplomacy” via the seizure of people and assets.</p><p>Iran has been known to coerce merchant shipping into its territorial waters to justify seizures for hostage diplomacy strategies (Bockmann, 2019; <xref ref-type="bibr" rid="ref7">Dudley, 2021</xref>; <xref ref-type="bibr" rid="ref23">Hughes and Selby, 2019</xref>; <xref ref-type="bibr" rid="ref51">Westbrook, 2023a</xref>). With incorrect position and velocity readings, a plane could unknowingly stray a few miles between invisible borders, from one airspace, which is peaceful, to one at war or which is hostile. Provided that there are very limited physical navigation aids to cross-check, or a well-caffeinated co-pilot to check every other instrument on board, even slow and subtle increase in <italic>speed</italic> and changes in <italic>direction</italic> over relatively long periods could create eye-watering slip-ups. Researchers have found that they can purposely deviate the speeds of aircraft targeting onboard FLARM transceiver devices by implementing faked target positions and reported positions of other aircraft (<xref ref-type="bibr" rid="ref26">Jansen <italic>et al</italic>., 2018</xref>, p. 1021). This could also inadvertently influence a pilot to intrude into airspace.</p><p>No open-source account exists of these methods of attacks happening to manned aircraft. The lengths at which governments and non-state actors will go to leverage concessions, however, leave the question of worse-case scenarios open to conjecture. The Belarussian government deliberately falsified a bomb threat on an Athens to Vilnius Ryanair flight (4978) to arrest 27-year-old journalist Roman Protasevich during its brutal crackdown on dissidents in the country (<xref ref-type="bibr" rid="ref9">Eccles and Sheftalovich, 2022</xref>). The United Kingdom and EU, among other states, banned flights from using Belarussian airspace.</p><p>Spoofing-enabled hijacking or stealing can also be done to obtain intellectual property. Indeed, in 2012, it was speculated that Iran’s military spoofed an American RQ-170 spy drone operating on the Afghan–Iran border. Having boasted of successfully spoofing the drone to land, and showcasing the drone to international media, the Iranians subsequently reverse-engineered the machine in design, material (which was “stealth-coated”), and possibly components (including flight controls, communications, video equipment, and self-destruct holding pattern or return-to-base mechanisms). There has been concern expressed by the US intelligence officials that the design has been shared with Chinese and Russian scientists, perhaps to assist in reverse-engineering the machine (<xref ref-type="bibr" rid="ref27">Kelley and Cenciotti, 2012</xref>). Five years after capture, the Iranian Revolutionary Guard Corps aerospace division revealed a new “attack drone” called <italic>Saegheh</italic> (or “Thunderbolt” in English), which looked markedly similar to the RQ-170 (<xref ref-type="bibr" rid="ref4">Cenciotti, 2016</xref>). While there are no known instances of civilian aircraft having been targeted, it is worth considering military systems as being ample targets for such political tactics. The Russian government has reportedly shared western technologies found on the battlefield with its allies in exchange for material assistance (<xref ref-type="bibr" rid="ref22">Haynes, 2022</xref>).</p></sec></sec><sec id="S4" sec-type="conclusions"><title>Conclusions and Discussion</title><p>The invasion of Ukraine has led to a precarious situation of military RFI affecting commercial aircraft in Europe, and the results of this research can be applied anywhere in the world. From a broader geopolitical perspective, it is clear that jamming and spoofing could escalate tensions between states as a result of misinterpretation or miscalculations of intentions, or as a result of non-state actions. Evidently, spoofing—the turning of lies into truths—can complement alternative news and feed false narratives, something that Iran may have done over recent years to marine and aviation systems with falsified location data. This form of “sub-threshold warfare,” operating in a grey zone below the threshold of war without direct conflict, now goes part and parcel with modern digital life.</p><p>For non-state actors, although limited in terms of targets and equipment, state support would widen the targets and tactical options, and therefore it is important that such potentialities are avoided. We see in contemporary conflicts, such as in Syria and Ukraine or between the United States and Iran, that states have flagrantly different interpretations about who is a terrorist, a state actor, or a freedom fighter. Their skewed interpretations and moral dividends allow them to choose who to train, who to arm, who to finance, and who to target without impunity. It is therefore not speculative to claim that Russia will transfer military-grade spoofing technologies to non-state actors if a situation arises beyond rational control.</p><p>Although many pilots will revert to other navigation references if their GPS is degraded, the likelihood of attack success will be in situations where people are less engaged with their surroundings (e.g. in autopilot), distracted due to interference, in poor weather conditions, or over-reliant on their GPS interfaces (<xref ref-type="bibr" rid="ref51">Westbrook, 2023a</xref>, p. 74). While most cases of RFI will not manifest into something catastrophic, for malign intentions it is still important to stay within the logic of “they only need to be successful once.” That is why, pilot training, anti-spoofing and anti-jamming systems, and training for identifying inconsistencies in navigation and positional data via various instruments will ensure safe air travel in Europe. Research into the criminal and political objectives of specific RFI must also keep pace with contemporary events. This article has identified tactics of decoy spoofing and following/correcting crooked paths as the main tactics supplementing political objectives by cyber–physical means.</p><p>The threat to aircraft is evidently not confined to geographical zones. Indeed, the threat is widespread, irregular, and intermittent and can happen any time. Improving detection and mitigating, and communicating the threat requires real-time notifications. This is something that <xref ref-type="bibr" rid="ref10">Eurocontrol (2021</xref>, p. 7) is currently working on in light of the opportunities presented with big data, AI, and business intelligence. Evidently, in-flight RFI identification needs to be enhanced, as reportedly 36% of flight inspection aircraft possess a basic ability to detect GNSS RFI, and even fewer have geo-location capabilities (<xref ref-type="bibr" rid="ref10">Eurocontrol, 2021</xref>, p. 7). Such reports need outside independent scrutiny, as without it, they will not receive alternative observances from different perspectives, and thus provides a limited threat and risk picture. Its relevance to wider and broader perspectives on political motivations alone could greatly contribute to security studies’ literature.</p><p>Expanding on this point, while the article contributes to discussions about RFI within a confined geopolitical conflict, the analysis could further benefit from contextualising EW in alignment with geopolitical perspectives in the cyber domain (<xref ref-type="bibr" rid="ref51">Westbrook, 2023a</xref>, 2023b). Further analysis into key theories in security studies, such as conflict escalation pathways, could add further richness to the findings.</p></sec></body><back><sec id="S5" sec-type="financial-disclosure"><title>Funding</title><p>This research received no external funding.</p></sec><sec id="S6"><title>Data Availability Statement</title><p>All data used in this article has come from open access sources.</p></sec><sec id="S7"><title>Disclosure statement</title><p>No potential conflict of interest was reported by the author. The author read and agreed to the published version of the manuscript.</p></sec><ref-list><ref id="ref1"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Adde</surname>, <given-names>N</given-names></string-name></person-group>. (<year>2021</year>) <article-title>‘Calls grow to find back up systems for GPS’</article-title>, <source>National Defense</source>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.nationaldefensemagazine.org/articles/2021/2/11/calls-grow-to-find-back-up-systems-for-gps">www.nationaldefensemagazine.org/articles/2021/2/11/calls-grow-to-find-back-up-systems-for-gps</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref2"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Alohali</surname>, <given-names>B</given-names></string-name></person-group>. (<year>2019</year>) <article-title><italic>Cyber security threat to air navigation service provider (ANSP)</italic></article-title>. <source>PowerPoint slides</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.icao.int/Meetings/MIDCyberSec/PublishingImages/Pages/Presentations/2_Cyber%20Security.pdf">https://www.icao.int/Meetings/MIDCyberSec/PublishingImages/Pages/Presentations/2_Cyber%20Security.pdf#search=spoofing</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref3"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Aviation Safety Reporting System (ASRS)</collab></person-group> (<year>2023</year>) <article-title><italic>Aviation Safety Reporting System</italic></article-title>. <source>NASA ASRS</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://asrs.arc.nasa.gov">https://asrs.arc.nasa.gov</ext-link> (Accessed: 10 May 2023).</mixed-citation></ref><ref id="ref4"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Cenciotti</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2016</year>) <article-title>‘Iran unveils new UCAV modelled on a captured US RQ-170 stealth drone’</article-title>, <source>The Aviationist</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://theaviationist.com/2016/10/02/iran-unveils-new-ucav-modelled-on-captured-u-s-rq-170-stealth-drone/">https://theaviationist.com/2016/10/02/iran-unveils-new-ucav-modelled-on-captured-u-s-rq-170-stealth-drone/</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref5"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>Center for Advanced Defense Studies (C4ADS)</collab></person-group> (<year>2019</year>) <chapter-title><italic>Above us only stars: exposing GPS spoofing in Russia and Syria</italic></chapter-title>. <source>Resilient Navigation and Timing Foundation</source>, <publisher-name>University of Texas at Austin</publisher-name>, pp. <fpage>1</fpage>–<lpage>66</lpage>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.c4reports.org/aboveusonlystars">https://www.c4reports.org/aboveusonlystars</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref6"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Costin</surname>, <given-names>A</given-names></string-name>. and <string-name><surname>Francillon</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2012</year>) <article-title>‘Ghost in the air (traffic): on insecurity of ADS-B protocol and practical attacks on ADS-B devices’</article-title>, <source>EURECOM. BLACKHAT</source>, <day>21–26</day><month>July</month>, <publisher-loc>Las Vegas, NV</publisher-loc>, pp. <fpage>1</fpage>–<lpage>10</lpage>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.s3.eurecom.fr/docs/bh12us_costin.pdf">https://www.s3.eurecom.fr/docs/bh12us_costin.pdf</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref7"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Dudley</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2021</year>) <article-title>‘South Korea agrees to unfreeze $1 billion in Iranian assets, following tanker seizure by Tehran’</article-title>, <source>Forbes</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.forbes.com/sites/dominicdudley/2021/02/24/south-korea-agrees-to-unfreeze-1-billion-in-iranian-assets-following-tanker-seizure-by-tehran/?sh=66ea285c1386">https://www.forbes.com/sites/dominicdudley/2021/02/24/south-korea-agrees-to-unfreeze-1-billion-in-iranian-assets-following-tanker-seizure-by-tehran/?sh=66ea285c1386</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref8"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Dutch Safety Board</collab></person-group> (<year>2014</year>) <article-title><italic>Stick shaker warning on ILS final, Eindhoven Airport</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.onderzoeksraad.nl/en/page/3003/stick-shaker-warning-on-ils-final-eindhoven-airport">www.onderzoeksraad.nl/en/page/3003/stick-shaker-warning-on-ils-final-eindhoven-airport</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref9"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Eccles</surname>, <given-names>M</given-names></string-name>. and <string-name><surname>Sheftalovich</surname>, <given-names>Z</given-names></string-name></person-group>. (<year>2022</year>) <article-title>‘Inside the control room of Belarus’ hijacked Ryanair flight’</article-title>, <source>Politco</source>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.politico.eu/article/belarus-hijack-minsk-ryanair-athens-to-vilnius-control-room/">www.politico.eu/article/belarus-hijack-minsk-ryanair-athens-to-vilnius-control-room/</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref10"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Eurocontrol</collab></person-group> (<year>2021</year>) <article-title><italic>Does radio frequency interference to satellite navigation pose an increasing threat to network efficiency, cost-effectiveness and ultimately safety</italic>?</article-title> <source>Aviation Intelligence Unit Think Paper #9, 1 March 2021</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.eurocontrol.int/sites/default/files/2021-03/eurocontrol-think-paper-9-radio-frequency-intereference-satellite-navigation.pdf">https://www.eurocontrol.int/sites/default/files/2021-03/eurocontrol-think-paper-9-radio-frequency-intereference-satellite-navigation.pdf</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref11"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>European Commission</collab></person-group> (<year>2022</year>) <article-title><italic>Statement by President von der Leyen on further measures to respond to the Russian invasion of Ukraine</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://ec.europa.eu/commission/presscorner/detail/en/statement_22_1441">https://ec.europa.eu/commission/presscorner/detail/en/statement_22_1441</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref12"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>European Parliament, Council of the European Union</collab></person-group> (<year>2014</year>) <article-title><italic>Regulation (EU) No 376/2014 of the European Parliament and of the Council of 3 April 2014 on the reporting, analysis and follow-up of occurrences in civil aviation, amending Regulation (EU) No 996/2010 of the European Parliament and of the council and repealing Directive 2003/42/EC of the European Parliament and of the council and Commission Regulations (EC) No. 1321/2007 and (EC) No 1330/2007 Text with EEA relevance</italic></article-title>. <source>Document 32014R0376</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:32014R0376">https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:32014R0376</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref13"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>European Union Aviation Safety Agency (EASA)</collab></person-group> (<year>2022a</year>) <article-title>‘Review of aviation safety issues arising from the war in Ukraine version 1’</article-title>, Available at: <ext-link ext-link-type="uri" xlink:href="http://www.easa.europa.eu/downloads/136453/en">www.easa.europa.eu/downloads/136453/en</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref14"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>European Union Aviation Safety Agency (EASA)</collab></person-group> (<year>2022b</year>) <article-title><italic>ASA publishes SIB to warn of intermittent GNSS outages near Ukraine conflict areas</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.easa.europa.eu/en/newsroom-and-events/news/easa-publishes-sib-warn-intermittent-gnss-outages-near-ukraine-conflict">www.easa.europa.eu/en/newsroom-and-events/news/easa-publishes-sib-warn-intermittent-gnss-outages-near-ukraine-conflict</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref15"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>European Union Aviation Safety Agency (EASA)</collab></person-group> (<year>2022c</year>) <article-title><italic>Restrictive measures – Russia's military attack on Ukraine</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.easa.europa.eu/en/the-agency/restrictive-measures-russia">https://www.easa.europa.eu/en/the-agency/restrictive-measures-russia</ext-link> (Accessed: 10 May 2023).</mixed-citation></ref><ref id="ref16"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>European Union Aviation Safety Agency (EASA)</collab></person-group> (<year>2022d</year>) <article-title><italic>EASA launches European information sharing and cooperation platform on conflict zones</italic></article-title> <day>3</day> <month>March</month>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.easa.europa.eu/en/newsroom-and-events/press-releases/easa-launches-european-information-sharing-and-cooperation">https://www.easa.europa.eu/en/newsroom-and-events/press-releases/easa-launches-european-information-sharing-and-cooperation</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref17"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Gangeskar</surname>, <given-names>D</given-names></string-name>. and <string-name><surname>Laagstein</surname>, <given-names>K</given-names></string-name></person-group>. (<year>2022</year>) <article-title>’Denne lille gjenstanden kan føre til at liv går tapt’</article-title>, <source>2 Nyheter</source>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.tv2.no/nyheter/innenriks/denne-lille-gjenstanden-kan-fore-til-at-liv-gar-tapt/15121495/">www.tv2.no/nyheter/innenriks/denne-lille-gjenstanden-kan-fore-til-at-liv-gar-tapt/15121495/</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref18"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Goodwin</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2019</year>) <chapter-title>‘The radio navigation planes use to land safely is insecure and can be hacked’</chapter-title>, <source>ArsTechnica</source>. <comment>German Federal Bureau of Aircraft Accident Investigation, Status Report (BFU EX10-11). Available at: -arstechnica.com/information-technology/2019/05/the-radio-navigation-planes-use-to-land-safely-is-insecure-and-can-be-hacked/ (Accessed: 3 January 2024)</comment>.</mixed-citation></ref><ref id="ref19"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Goward</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2023</year>) <article-title>‘Increasing GNSS interference: UK and EU warn aviation’</article-title>, <source>GPS World</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.gpsworld.com/increasing-gnss-interference-uk-and-eu-warn-aviation/">https://www.gpsworld.com/increasing-gnss-interference-uk-and-eu-warn-aviation/</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref20"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Gritten</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2023</year>) <article-title>‘Ukraine plane: Iran court jails 10 over downing of flight PS752’</article-title>, <source>BBC News</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.bbc.com/news/world-middle-east-65298216">https://www.bbc.com/news/world-middle-east-65298216</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref21"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Harris</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2021</year>) <article-title>‘FFA files reveal a surprising threat to airline safety: the US military’s GPS test’</article-title>, <source>IEEE Spectrum</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://spectrum.ieee.org/faa-files-reveal-a-surprising-threat-to-airline-safety-the-us--militarys-gps-tests">https://spectrum.ieee.org/faa-files-reveal-a-surprising-threat-to-airline-safety-the-us--militarys-gps-tests</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref22"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Haynes</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2022</year>) <article-title>‘Russia flew €140 m in cash and captured Western weapons to Iran in return for deadly drones, source claims’</article-title>, <source>Sky News</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://news.sky.com/story/russia-gave-eur140m-and-captured-western-weapons-to-iran-in-return-for-deadly-drones-source-claims-12741742">https://news.sky.com/story/russia-gave-eur140m-and-captured-western-weapons-to-iran-in-return-for-deadly-drones-source-claims-12741742</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref23"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Hughes</surname>, <given-names>C</given-names></string-name>. and <string-name><surname>Selby</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘Iran tanker crisis: MI6 probe link to Putin after British ship is seized’</article-title>, <source>The Mirror</source>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.mirror.co.uk/news/world-news/iran-tanker-crisis-mi6-probe-18458279">www.mirror.co.uk/news/world-news/iran-tanker-crisis-mi6-probe-18458279</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref24"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab>International Civil Aviation Organization</collab></person-group> (<year>2012</year>) <article-title><italic>High-level conference on aviation security (HLCAS)</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.icao.int/Meetings/avsecconf/Documents/WP%2039/WP.39.Korea.pdf">www.icao.int/Meetings/avsecconf/Documents/WP%2039/WP.39.Korea.pdf#search=spoofing</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref25"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>International Civil Aviation Organization</collab></person-group> (<year>2018</year>) <article-title><italic>Update of the GNSS signal protection issue</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.icao.int/APAC/Meetings/2018%20PBN%20WS%20%20PBNICG5/IP08_AI06_Update%20of%20GNSS%20signal%20protection%20issue_final.pdf">www.icao.int/APAC/Meetings/2018%20PBN%20WS%20%20PBNICG5/IP08_AI06_Update%20of%20GNSS%20signal%20protection%20issue_final.pdf#search=jamming</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref26"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Jansen</surname>, <given-names>K</given-names></string-name>., <string-name><surname>Schafer</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Moser</surname>, <given-names>D</given-names></string-name>., <string-name><surname>Lenders</surname>, <given-names>V</given-names></string-name>., <string-name><surname>Popper</surname>, <given-names>C</given-names></string-name>. and <string-name><surname>Schmitt</surname>, <given-names>J</given-names></string-name></person-group>. (<year>2018</year>) <article-title>‘Crowd-GPS-Sec: leveraging crowdsourcing to detect and localize GPS spoofing attacks’</article-title>, <source>IEEE Symposium on Security and Privacy (SP)</source>, <publisher-loc>San Francisco, CA</publisher-loc>, pp. <fpage>1018</fpage>–<lpage>1031</lpage>. doi: <pub-id pub-id-type="doi">10.1109/SP.2018.00012</pub-id>.</mixed-citation></ref><ref id="ref27"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Kelley</surname>, <given-names>M.B</given-names></string-name>. and <string-name><surname>Cenciotti</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2012</year>) <article-title>‘Report: Chinese experts could be in Iran right now collecting parts from the captured RQ-170 drone’</article-title>, <source>Business Insider</source>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.businessinsider.com/report-chinese-experts-to-inspect-and-collect-parts-of-drone-captured-in-iran-2012-8?r=USandIR=T">www.businessinsider.com/report-chinese-experts-to-inspect-and-collect-parts-of-drone-captured-in-iran-2012-8?r=USandIR=T</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref28"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kerns</surname>, <given-names>A.J</given-names></string-name>., <string-name><surname>Shepard</surname>, <given-names>D.P</given-names></string-name>., <string-name><surname>Bhatti</surname>, <given-names>J.A</given-names></string-name>. and <string-name><surname>Humphreys</surname>. <given-names>T.E</given-names></string-name></person-group>. (<year>2014</year>) <article-title>‘Unmanned aircraft capture and control via GPS spoofing’</article-title>, <source>Journal of Field Robotics</source>, <volume>31</volume>(<issue>4</issue>), pp. <fpage>617</fpage>–<lpage>636</lpage>. doi: <pub-id pub-id-type="doi">10.1002/rob.21513</pub-id>.</mixed-citation></ref><ref id="ref29"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Khan</surname>, <given-names>S.Z</given-names></string-name>, <string-name><surname>Mohsin</surname>, <given-names>M</given-names></string-name>. and <string-name><surname>Iqbal</surname>, <given-names>W</given-names></string-name></person-group>. (<year>2021</year>). <article-title>‘On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions’</article-title>, <source>Peer J Computer Science</source>, <volume>7</volume>, p. <fpage>e507</fpage>. doi: <pub-id pub-id-type="doi">10.7717/peerj-cs.507</pub-id>.</mixed-citation></ref><ref id="ref30"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kožović</surname>, <given-names>D</given-names></string-name>. and <string-name><surname>Đurđević</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘Cyber security in aviation’</article-title>, <source>Megatrend Revija</source>, <volume>16</volume>(<issue>2</issue>), pp. <fpage>39</fpage>–<lpage>56</lpage> (in Serbian). doi: <pub-id pub-id-type="doi">10.5937/MegRev1902039K</pub-id>.</mixed-citation></ref><ref id="ref31"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kožović</surname>, <given-names>D</given-names></string-name>. and <string-name><surname>Đurđević</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2021</year>) <article-title>‘Spoofing in aviation: security threats on GPS and ADS-B systems’</article-title>, <source>Vojnotehnicki Glasnik (<italic>Military Technical Courier</italic>)</source>, <volume>69</volume>(<issue>2</issue>), pp. <fpage>461</fpage>–<lpage>485</lpage>. doi: <pub-id pub-id-type="doi">10.5937/vojtehg69-30119</pub-id>.</mixed-citation></ref><ref id="ref32"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>McCallie</surname>, <given-names>D.L</given-names></string-name></person-group>. (<year>2011</year>) <chapter-title><italic>Exploring potential ADS-B vulnerabilites in the FAA’s nextgen air transportation system</italic></chapter-title>, <source>Master’s thesis, Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Homeland Security Digital Library</publisher-name>. Available at: <ext-link ext-link-type="uri" xlink:href="https://apps.dtic.mil/sti/pdfs/ADA545599.pdf">https://apps.dtic.mil/sti/pdfs/ADA545599.pdf</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref33"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Milner</surname>. <given-names>G</given-names></string-name></person-group>. (<year>2020</year>) <article-title>‘How vulnerable is G.P.S.?’</article-title>, <source>New Yorker</source>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.newyorker.com/tech/annals-of-technology/how-vulnerable-is-gps">www.newyorker.com/tech/annals-of-technology/how-vulnerable-is-gps</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref34"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Mishra</surname>, <given-names>V.K</given-names></string-name></person-group>. (<year>2022</year>) <article-title><italic>Agenda item 2 – radio frequency interference on GNSS signal - an Eurocontrol study</italic> (PowerPoint slides)</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.icao.int/APAC/Meetings/2022%20PBNICG%209/WP06%20-%20Radio%20Frequency%20Interference%20of%20GNSS%20Signal.pdf">www.icao.int/APAC/Meetings/2022%20PBNICG%209/WP06%20-%20Radio%20Frequency%20Interference%20of%20GNSS%20Signal.pdf#search=jamming</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref35"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>National Aeronautics and Space Administration (NASA)</collab></person-group> (<year>2022</year>) <chapter-title>‘Aviation safety reporting system (ASRS) data, database report set, global positioning system (GPS) reports’</chapter-title>, <publisher-name>Ames Research Center</publisher-name>, <publisher-loc>Moffett Field</publisher-loc>. Available at: <ext-link ext-link-type="uri" xlink:href="https://asrs.arc.nasa.gov/docs/rpsts/gps.pdf">https://asrs.arc.nasa.gov/docs/rpsts/gps.pdf</ext-link> (Accessed: 3 January 2024). <comment>See: ACN: 1747135 reported ‘lost GPS contact, got off track while reviewing the sectional chart’; ACN: 1775414 reported that ‘they inadvertently entered Class B airspace without clearance due to distraction from having to troubleshoot the GPS system on the aircraft’; ACN: 1775414 reported ‘pilot errors in communication and GPS interference as distractions’; ACN: 1747135 reported ‘got off track while reviewing the sectional chart’</comment>.</mixed-citation></ref><ref id="ref36"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Netherlands Prosecution Service</collab></person-group> (<year>2021</year>) <article-title><italic>Prosecution recommends life imprisonment for downing of MH17</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.prosecutionservice.nl/topics/mh17-plane-crash/news/2021/12/22/prosecution--recommends-life-imprisonment-for-downing-of-mh17">https://www.prosecutionservice.nl/topics/mh17-plane-crash/news/2021/12/22/prosecution--recommends-life-imprisonment-for-downing-of-mh17</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref37"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Nilsen</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2022a</year>) <article-title>‘Pro-Russian hacker group says it attacked Norway’</article-title>, <source>The Barents Observer</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://thebarentsobserver.com/en/security/2022/06/pro-russian-hacker-group-says-it-attacked-norway">https://thebarentsobserver.com/en/security/2022/06/pro-russian-hacker-group-says-it-attacked-norway</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref38"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Nilsen</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2022b</year>) <article-title>‘More Russian GPS jamming than ever across border to Norway’</article-title>, <source>The Barents Observer</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://thebarentsobserver.com/en/security/2022/07/more-russian-gps-jamming-ever-across--border-norway">https://thebarentsobserver.com/en/security/2022/07/more-russian-gps-jamming-ever-across--border-norway</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref39"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Norwegian Government Security and Service Organisation</collab></person-group> (<year>2020</year>) <article-title>Report from the working group on GNSS/GPS-disruptions in aviation</article-title>. <publisher-loc>Norway</publisher-loc>: <publisher-name>Group of State Secretaries (Ministry of Transport [Chair]; Ministry of Justice and Public Security; Ministry of Local Government and Modernisation; Ministry of Defence; Ministry of Foreign Affairs); The Norwegian Communications Authority (Nkom); The Civil Aviation Authority of Norway (CAA Norway))</publisher-name>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.regjeringen.no/contentassets/ea62b7ef5071439a99390c77a54f2bc4/disruptions-in-aviation.pdf">https://www.regjeringen.no/contentassets/ea62b7ef5071439a99390c77a54f2bc4/disruptions-in-aviation.pdf</ext-link> (Accessed 28 January 2024).</mixed-citation></ref><ref id="ref40"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Patrick</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2015</year>) <article-title>‘Drone war in Ukraine forces big tech changes’</article-title>, <source>The Fiscal Times</source>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.thefiscaltimes.com/2015/03/10/Drone-War-Ukraine-Forces-Big-Tech-Changes">www.thefiscaltimes.com/2015/03/10/Drone-War-Ukraine-Forces-Big-Tech-Changes</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref41"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Patrick</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2016</year>) <article-title>‘To counter Russia’s cyber prowess, US army launches rapid-tech office’</article-title>, <source>Defense One</source>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.defenseone.com/technology/2016/08/russia-cyber-army-rapid-technology-office/131185/">www.defenseone.com/technology/2016/08/russia-cyber-army-rapid-technology-office/131185/</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref42"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Rietjens</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘Unraveling disinformation: the case of Malaysia Airlines Flight MH17’</article-title>, <source>The International Journal of Intelligence, Security, and Public Affairs</source>, <volume>21</volume>(<issue>3</issue>), pp. <fpage>195</fpage>–<lpage>218</lpage>. doi: <pub-id pub-id-type="doi">10.1080/23800992.2019.1695666</pub-id>.</mixed-citation></ref><ref id="ref43"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Sathaye</surname>, <given-names>H</given-names></string-name>., <string-name><surname>Schepers</surname>, <given-names>D</given-names></string-name>., <string-name><surname>Ranganathan</surname>, <given-names>A</given-names></string-name>. and <string-name><surname>Noubir</surname>, <given-names>G</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘Wireless attacks on aircraft instrument landing systems’</article-title>, <source>Proceedings of the 28th USENIX Security Symposium, 14–16 August 2019</source>, <publisher-loc>Santa Clara, CA</publisher-loc>, pp. <fpage>375</fpage>–<lpage>372</lpage>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.usenix.org/system/files/sec19-sathaye.pdf">https://www.usenix.org/system/files/sec19-sathaye.pdf</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref44"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>StrategyPage</collab></person-group> (<year>2019</year>) <article-title><italic>Electronic weapons: Russia takes a victory lap</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.strategypage.com/htmw/htecm/articles/20191103.aspx">www.strategypage.com/htmw/htecm/articles/20191103.aspx</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref45"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>The Associated Press</collab></person-group> (<year>2011</year>?) <chapter-title><italic>The Al-Qaida papers – drones</italic></chapter-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.academia.edu/5185403/The_Al_Qaida_Papers_Drone">https://www.academia.edu/5185403/The_Al_Qaida_Papers_Drone</ext-link> (Accessed: 6 July 2022).</mixed-citation></ref><ref id="ref46"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Thurber</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2012</year>) <article-title>‘ADS-B is insecure and easily spoofed, say hackers’</article-title>, <source>AIN Online</source>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.ainonline.com/aviation-news/aviation-international-news/2012-09-03/ads-b-insecure-and-easily-spoofed-say--hackers">www.ainonline.com/aviation-news/aviation-international-news/2012-09-03/ads-b-insecure-and-easily-spoofed-say--hackers</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref47"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>UK Government</collab></person-group> (<year>2023</year>) <article-title><italic>Sanctions against Russia</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://researchbriefings.files.parliament.uk/-documents/CBP-9481/CBP-9481.pdf">https://researchbriefings.files.parliament.uk/-documents/CBP-9481/CBP-9481.pdf</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref48"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>US Department of Transportation Maritime Administration</collab></person-group> (<year>2022</year>) <article-title><italic>2022-005-various-GPS interference and AIS spoofing</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://maritime.dot.gov/msci/2022-005-various-gps-interference-ais-spoofing">https://maritime.dot.gov/msci/2022-005-various-gps-interference-ais-spoofing</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref><ref id="ref49"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Westbrook</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2019a</year>) <article-title>‘The global positioning system and military jamming: The geographies of electronic warfare’</article-title>, <source>Journal of Strategic Security</source><volume>12</volume>(<issue>2</issue>), pp. <fpage>1</fpage>–<lpage>16</lpage>. doi: <pub-id pub-id-type="doi">10.5038/1944-0472.12.2.1720</pub-id>.</mixed-citation></ref><ref id="ref50"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Westbrook</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2019b</year>) <article-title>‘Will GPS jammers proliferate in the smart city?’</article-title>, <source>Salus Journal</source>, <volume>7</volume>(<issue>2</issue>), pp. <fpage>45</fpage>–<lpage>67</lpage>. <ext-link ext-link-type="uri" xlink:href="https://view.salusjournal.com/article/view/102/96">https://view.salusjournal.com/article/view/102/96</ext-link>.</mixed-citation></ref><ref id="ref51"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Westbrook</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2023a</year>) <article-title>‘A taxonomy of radiofrequency jamming and spoofing strategies and criminal motives’</article-title>, <source>Journal of Strategic Security (JSS)</source>, <volume>16</volume>(<issue>1</issue>), pp. <fpage>68</fpage>–<lpage>80</lpage>. doi: <pub-id pub-id-type="doi">10.5038/1944-0472.16.2.2081</pub-id>.</mixed-citation></ref><ref id="ref52"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Westbrook</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2023b</year>) <article-title>‘Radiofrequency interference strategies targeting marine navigation systems: political motives and consequences’</article-title>, <source>Journal on Baltic Security</source>, <volume>9</volume>(<issue>1</issue>), pp. <fpage>69</fpage>–<lpage>97</lpage>. doi: <pub-id pub-id-type="doi">10.57767/jobs_2023_003</pub-id>.</mixed-citation></ref><ref id="ref53"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Wise</surname>, <given-names>J</given-names></string-name></person-group>. (<year>2019</year>) <chapter-title><italic>The taking of MH370</italic></chapter-title>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>The Yellow Cabin Press (Published independently)</publisher-name>.</mixed-citation></ref><ref id="ref54"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Woodrow</surname>, <given-names>B</given-names></string-name></person-group>. (<year>2017</year>) <article-title>‘Are GPS jamming incidents a growing problem for aviation?’</article-title>, <source>Aviation Today</source>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.aviationtoday.com/2017/01/31/are-gps-jamming-incidents-a-growing-problem-for-aviation/">www.aviationtoday.com/2017/01/31/are-gps-jamming-incidents-a-growing-problem-for-aviation/</ext-link> (Accessed: 3 January 2024).</mixed-citation></ref></ref-list></back></article>
