<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1d1 20130915//EN" "JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">SDQ</journal-id><journal-title-group><journal-title>Security &amp; Defence Quarterly</journal-title><abbrev-journal-title>SDQ</abbrev-journal-title></journal-title-group><issn pub-type="epub">2544-994X</issn><issn pub-type="ppub">2300-8741</issn><publisher><publisher-name>Akademia Sztuki Wojennej</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">SDQ-49-00390</article-id><article-id pub-id-type="doi">10.35467/sdq/196515</article-id><article-categories><subj-group subj-group-type="heading"><subject>RESEARCH PAPER</subject></subj-group></article-categories><title-group><article-title>Lethal empowerment and electronic crime: A focus on radio-frequency interference capabilities</article-title></title-group><contrib-group content-type="authors"><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-9889-3673</contrib-id><name><surname>Westbrook</surname><given-names>Tegg</given-names></name><email>tegg.westbrook@uis.no</email></contrib><aff id="aff1">Department of Safety, Economics, and Planning, University of Stavanger, Kjell Arholms Gate 41, 4021 Stavanger, Norway</aff></contrib-group><pub-date pub-type="epub"><day>22</day><month>01</month><year>2025</year></pub-date><volume>49</volume><issue>1</issue><fpage>1</fpage><lpage>18</lpage><history><date date-type="received"><day>19</day><month>09</month><year>2024</year></date><date date-type="rev-recd"><day>22</day><month>11</month><year>2024</year></date><date date-type="accepted"><day>26</day><month>11</month><year>2024</year></date></history><permissions><copyright-statement>© 2025 T. Westbrook published by War Studies University, Poland.</copyright-statement><copyright-year>2025</copyright-year><license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0"><license-p>This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (<ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/">http://creativecommons.org/licenses/by/4.0/</ext-link>).</license-p></license></permissions><abstract><p>This article focuses on the capabilities of criminals in using radiofrequency interference (RFI) devices to target systems that use the Global Positioning System (GPS). Surveying over a 22-year period during which GPS has been widely used by many industries, it seeks to understand how the electronic threat has evolved and changed. Focusing on the accessibility, usability, effectiveness, versatility, transportability, and concealability of RFI devices, and utilising a number of sources from engineering disciplines, hacker events, and media pieces, it argues that the more reliant we are on GPS, the more threat actors’ target choices and means, ends, and, indeed, motivations for targeting systems will expand, elevating the risks to GPS users. This article finds that arguably some of the most disagreeable actors have elevated from unsophisticated to semi-sophisticated in the space of 20 years, and can target systems cheaply, easily, and effectively. In the space of two decades, the combination of war, the expansion of digitalisation, the commercialisation of military systems, and the demand and supply that feeds technological innovations, have left us with an entirely different threat picture.</p></abstract><kwd-group><kwd>global navigation satellite system</kwd><kwd>terrorism</kwd><kwd>cybercrime</kwd><kwd>electronic crime</kwd></kwd-group></article-meta></front><body><sec id="S1"><title>Introduction</title><p>The aim of this article is to understand how the threat of electronic crime and terrorism has manifested in line with the diffusion of the Global Positioning System (GPS)-dependent and GPS-aided systems in the past two decades. The objective is to establish how technological innovations have given criminal and politically violent actors the capabilities to target systems with radiofrequency interference (RFI) devices and how this relates to current literature in this area. Such analyses are important, as while cybercrime has received much focus, electronic crimes have received comparatively limited overview.</p><p>There are several examples where criminals have used electromagnetic energy to enable physical crimes. Criminals have used electromagnetic disruptors to interfere with gambling machines, to compromise security systems at banks, jewellers, and in expensive vehicles (<xref ref-type="bibr" rid="ref12">US Department of Homeland Security (DHS), 2003</xref>). Bluetooth, WiFi, and 5G jammers are available on the market for users seeking privacy, but they can also be used for cyber-enabled property theft. Previous research has expanded on how criminals, from petty to serious, have used RFI to enable physical crimes (<xref ref-type="bibr" rid="ref55">Westbrook, 2019a</xref>, 2023a, 2023b, <xref ref-type="bibr" rid="ref59">2023c</xref>, 2024). These have investigated different RFI strategies and considered how they fit with the modus operandi of various criminal actors. However, the focus on the capability and sophistication of actors has not been properly contextualised, which gives rise to concerns about the destructive capabilities of extreme groups.</p><p>Scholars of terrorism studies have long been interested in how technologies have empowered individuals or groups to cause mayhem. <xref ref-type="bibr" rid="ref15">Dolnik’s (2007)</xref> <italic>Understanding terrorist innovation: Technology, tactics and global trends</italic>, for example, puts forward the idea that weapon choice can be categorised into different opportunity parameters shaping the modus operandi of violent actors. <xref ref-type="bibr" rid="ref8">Clark and Newman’s (2006)</xref> <italic>Outsmarting the terrorists</italic> has also inspired much focus on the technological and environmental conditions that influence the decisions and actions of terrorist groups.</p><p><xref ref-type="bibr" rid="ref10">Cronin’s (2020)</xref> book <italic>Power to the people: How open technological innovation is arming tomorrow’s terrorists</italic> also seeks to understand why, and anticipate how, some technologies are adopted by violent actors. She argues that there are distinctions to be made about why some technologies rapidly diffuse and why others do not. She uses “lethal empowerment theory” to understand and anticipate why some “technologies hold the greatest potential to become popular tools for political violence in the future” (p. 13). Certain lethal technologies are more likely to be adopted by violent groups and individuals because they are: accessible, cheap, simple to use, transportable, concealable, effective (providing leverage and more “bang for the buck,” for example), multi-use, not cutting-edge (usually in the second of third wave of innovation), bought off-the-shelf, part of a cluster of other emerging technologies (which are combined to magnify overall effects), symbolically resonant (which make them more potent than just their tactical effectiveness), and given to unexpected uses (p. 13). Cronin argues that such technologies extend the reach of criminal actors (p. 14).</p><p>While useful, such scholars noted above focus on traditional (kinetic) weapon choices, and do not deal with the prospect and impact of cyberterrorism or “electronic terrorism” in significant detail. There also remains a lack of historical contextualisation linking societal changes to specific elevated threat situations. This is perhaps due to the fact that it has been difficult to connect terrorist goals with the effects and impacts of cyberattacks. <xref ref-type="bibr" rid="ref28">Gross et al. (2017)</xref> nonetheless write of a “stress-based cyber terrorism effect” that is also useful for considering the likelihood of electronic weapons being adopted by non-state actors (NSAs) in their struggles. They argue that “[e]xposure to cyberterrorism is not benign and shares many traits with conventional terrorism.” Responses such as “stress, anxiety, insecurity, a preference for security over liberty, a re-evaluation of confidence in public institutions, a heightened perception of risk, and support for forceful government policies” are effects that can be achieved via cyberterrorism (Abstract).</p><p>There has been some focus on how sophisticated an actor needs to be to carry out headline-grabbing cyber-attacks. Overall, the “levels” of sophisticated RFI devices roughly correspond with the same categories of “cyberterrorists,” but they are imperfect generalisations. <xref ref-type="bibr" rid="ref11">Denning (2000)</xref> defined “cyberterror” capability into: <italic>simple-unstructured</italic> (capable of conducting “basic hacks against individual systems using tools created by someone else,” with little need for target analysis or learning capability); <italic>advanced-structured</italic> (capable of conducing more sophisticated attacks against multiple systems/networks and able to modify or create basic hacking tools, with elementary target analysis and learning capability); and <italic>complex-coordinated</italic> (capable of coordinated attacks potentially causing mass-disruption against hard defences).</p><p>Focusing on RFI, <xref ref-type="bibr" rid="ref41">Ranganathan et al. (2016)</xref> also provide detailed information about how use of RFI devices by sophisticated and unsophisticated actors can be defined. Additionally, scholars, such as <xref ref-type="bibr" rid="ref30">Humphreys et al. (2008)</xref>, <xref ref-type="bibr" rid="ref46">Shepard et al. (2012)</xref>, <xref ref-type="bibr" rid="ref61">Zeng et al. (2018)</xref>, and others, have attempted to classify various types of spoofing attacks into simple, intermediate, or sophisticated in terms of their effectiveness and subtlety. An issue with these articles is that while they seek to categorise levels of sophistication with “impact” as a barometer, they do not measure or delineate aspects of accessibility, usability as well as the versatility of specific cyber tools and how that broadly contributes to the threat picture. To summarise, electronic crime can be understood in similar ways to cybercrime, but it is necessary to place emphasis on equipment as well as end goals and the sophistication of the actor, which is where this article focuses most of its attention.</p></sec><sec id="S2"><title>The threat of jamming and spoofing</title><p>What makes RFI attacks attractive for criminals? The answer is that very simple attacks can help with their activities in different ways. Radio jamming is used to intentionally block the signals emitted from satellites to receivers, which affect tracking and navigation systems. Terrorists have long used jamming systems to deny service to drone surveillance or to avert surveillance. Terrorists may also use jamming to complement physical attacks, for example, degrading communications for emergency responders following a physical attack (<xref ref-type="bibr" rid="ref57">Westbrook, 2023a</xref>).</p><p>Spoofing, however, is much more sophisticated and malign than jamming, as spoofing is intended to inject falsified navigational data to influence a GPS-user, or the system, to make a choice favourable to the attacker. This can complement kidnappings, kinetic attacks, or enable physical attacks (<xref ref-type="bibr" rid="ref57">Westbrook, 2023a</xref>). This is much harder to achieve than a jamming attack, but has, as this article shows, become much easier to do over a short time span.</p><p>The article provides a historical overview of the jamming and spoofing threat from its identification, particularly from the 1990s to the present-day situation. The findings of this article indicate that the spoofing and jamming capabilities of state and non-state actors have evolved as the global navigation satellite system (GNSS) has, itself, metamorphosised into something that is now taken for granted as much as tap water. What is it that turned an attack that was difficult to achieve, with once bulky, heavy, and expensive equipment in the early 2000s, into something that someone with a modicum of technical knowledge can do rather cheaply, easily, and with a low chance of risking jail or death, in the last 20 years?</p></sec><sec id="S3" sec-type="methods"><title>Methods</title><p>The research consisted of a meta-data analysis of research into jamming and spoofing mainly from engineering and computer science papers, government reports, risk assessments, and from media. From the documents, special attention was paid to the costs, manpower required (for successful spoofing), and associated consequences (impact) of the attacks. It also focused on gathering other information, including the size of devices, versatility, and the level of sophistication and manpower required to use them. The findings were organised into themes associated with <xref ref-type="bibr" rid="ref10">Cronin’s (2020)</xref> lethal empowerment theory. It also, though to a less systematic degree, linked the observations to the “stress-based cyber terrorism effect” proposed by <xref ref-type="bibr" rid="ref28">Gross et al. (2017)</xref>, and Denning’s (2000) categories of sophistication. The results are expressed by way of subsections of the categorisations relevant to the lethal empowerment theory. The connections to the work of <xref ref-type="bibr" rid="ref28">Gross et al. (2017)</xref> and Denning’s (2000) theories are explored in the Conclusion.</p></sec><sec id="S4"><title>What is electronic crime and “electronicterrorism”?</title><p>While terror groups have found rudimentary but effective means to enable violence, their influence on GPS-aided and GPS-dependent systems has received only recent attention (<xref ref-type="bibr" rid="ref57">Westbrook, 2023a</xref>, 2023b, 2023c, 2024). However, first there is a need to distinguish the sometimes conflated notions of cyber terrorism, cyberattacks, cyber warfare, and cybercrime as opposed to electronic warfare, electronic attacks, and electronic terrorism, the former categories of which usually involve online activity via the Internet, the other uses and/or manipulates, offensively or defensively, the electromagnetic spectrum.</p><p>Academia is largely divided on the definition of cyberattacks, cybercrime, and cyber terrorism. Cybercriminals use computers, the Internet, or any networked activity for financial gains. A broad definition of cyber terrorism, which is usually not financially motivated, is “an act of politically motivated violence involving physical damage or personal injury caused by a remote digital interference with technology systems” (<xref ref-type="bibr" rid="ref17">Evan et al., 2017</xref>).</p><p>While crime using the electromagnetic spectrum to control or disrupt systems for financial gain is not widely seen (perhaps due to the limited financial benefit of interference alone), an adaptation of the term “international electromagnetic interference” was first described at the EMC Zurich Symposium in 1999. This was the “intentional malicious generation of electromagnetic energy introducing noise or signals into electric and electronic systems, thus disrupting, confusing or damaging these systems for terrorist or criminal purposes” (<xref ref-type="bibr" rid="ref23">Giri et al., 2020</xref>). Scholars of “electronic terrorism” are in more agreement about what it is, perhaps due to the more applicable connection between brute force electromagnetic energy, violence (radiation), and physical damage (of critical technical infrastructure and computer systems), and thus easily attributable to terrorist means–ends objectives.</p><p>While state actors have special licences to control information sent via the electromagnetic spectrum, non-state actors, including terrorists, rebels, or insurgents have demonstrated ingenuity using mostly commercially available technologies to take advantage of it. Use of radio receivers from toy planes, alarm clocks, and cell phones has allowed organisations like the Provisional Irish Republican Army (IRA), Al Qaeda, and many others to remotely detonate explosive materials. Using radio receivers from children’s toys gave the Provisional IRA the ability to effectively remote detonate explosives and avoid accidental deaths of bomb makers. After the British security services jammed those signals, the Provisional IRA adapted, using “unjammable” radio initiation systems, including infrared and light sensor initiation systems (<xref ref-type="bibr" rid="ref22">Gill, 2017</xref>), the techniques for which have reportedly been passed on to other violent organisations (<xref ref-type="bibr" rid="ref38">Magnuson, 2007</xref>). Indeed decades later, in 2006, during the wars in Afghanistan and Iraq, the US military devoted huge efforts to developing systems that could jam remotely detonate improvised explosive devices (IEDs) using microwave emitters. Al Qaeda, in turn, like the Provisional IRA, found alternative means of remote detonation. The US military tried microwave emitters, which were supposed to damage IEDs’ electronic circuitry, but they were simply shielded by the insurgents. The United States’ use of lasers also failed to work effectively (<xref ref-type="bibr" rid="ref10">Cronin, 2020</xref>). Al Qaeda’s IED war on coalition forces in Afghanistan proved highly successful.</p><p>As for navigation systems, the potential that malign actors could create situations that elevate tensions between adversaries came to fruition in the 1980s following the liberalisation of GPS for non-military users. President Ronald Reagan released an executive order allowing civilian use of GPS in 1983 after the Soviet Union’s downing of a Korean Airlines flight, which had strayed hundreds of miles off its planned course. While proving extremely useful for United States and coalition forces during Operation Desert Storm, the system eventually became fully operational in 1993 for civilian users, inevitably expanding the scalability of the “attack surface” (<xref ref-type="bibr" rid="ref33">Jones, 2017</xref>).</p><p>As GPS (without military encryption) steadily became available in commercial/civilian sectors through the 1990s, the spoofing and jamming threat for GPS-aided and GPS-dependent systems became a theoretical possibility. Many conferences and research studies concluded that while jamming was certainly possible (<xref ref-type="bibr" rid="ref21">Gerdan et al., 1995</xref>), in reality spoofing was simply too difficult to be a realistic probability. Nevertheless, in reality such attacks posed a conceivable if very remote possibility given how many commercial, state sectors, and safety-critical systems were becoming increasingly reliant on the open source jammable and theoretically spoofable GPS system for timing and navigation. With the expansion of the Internet and increasing reliance on networked technologies in many sectors and industries, a discourse surrounding “cyberterrorism” and “electronic terrorism” also emerged in the early 1990s. It was thought that “tomorrow’s terrorist may be able to do more damage with a keyboard than with a bomb,” with terms such as “electronic Pearl Harbor” frequently being used in security circles (<xref ref-type="bibr" rid="ref54">Weimann, 2004</xref>).</p><p>Global positioning system was becoming increasingly critical to business and societal functions in the early 21st century. Indeed, in 2000, President Bill Clinton announced that the United States would allow civilians, such as emergency services, sailors, and motorists, unrestricted access to a higher-grade GPS, previously left intentionally low grade before. It was perceived that such a move would have minimal impact on national security. This was in part due to the growing competition from other constellations, like Europe’s Galileo, which was planned to provide improved signal accuracy. Following this liberalisation, and the subsequent liberalisations of satellite-based information from other constellations, the economic benefits of unrestricted access could be measured in billions of dollars of revenue for national economies.</p><p>The ever-increasing reliance on GPS for critical functions of society prompted a number of government initiatives, in particular for transportation infrastructure. President Clinton directed the Department of Transportation to study the issue and make recommendations. The recommendations, informally called the <xref ref-type="bibr" rid="ref52">Volpe (2001)</xref> report, called for improved receivers and the development of interference detection networks as well as non-satellite navigation systems for use alongside GPS. The key finding of the report predicted that “[a]s GPS further penetrates into the civil infrastructure, it becomes a tempting target that could be exploited by individuals, groups or countries” (2001). It also found that it would be relatively straightforward to spoof GPS signals using commercially available GPS simulators.</p><p>The Volpe report was published 12 days before the September 11th attacks (9/11) in New York and Washington in 2001, and most of the recommendations were understandably sidelined (<xref ref-type="bibr" rid="ref24">Goward, 2016</xref>). The tragic events of 9/11 ignited discussion about spoofing and commercial air travel, especially on the subject of the Automatic Dependent Surveillance-Broadcast (ADS-B), which uses satellite navigation to broadcast position information to other aircraft (<xref ref-type="bibr" rid="ref60">Westbrook, 2024</xref>). The possibility of hijackers simply switching off ADS-B onboard flights (and other tracking devices) was also a concern. The European Commission was similarly concerned about its emerging satellite constellation, Galileo, mentioning in a communication “Economic terrorists, criminals or hostile agents” as possible attackers. Targeting of the constellation, as the communication from the European Commission stresses, could seriously impair the efficiency of national security and police forces, affect economic activities, and even lead “to the complete shutdown of services in some areas. This would seriously undermine user confidence in the system” (<xref ref-type="bibr" rid="ref9">Communication from the Commission to the European Parliament and the Council, 2002</xref>). Concerns about terrorists developing low-cost and portable electronic weapons, for example, high-powered microwave weapons, was also not misplaced. The US government-funded research found that a briefcase-sized microwave weapon could be constructed for as little as $2,000 by terrorist organisations (<xref ref-type="bibr" rid="ref51">US Foreign Affairs, Defense, and Trade Division, 2008</xref>).</p><p>Since GPS can be encrypted, the question was whether ADS-B should also be. Ideas about encrypting the ADS-B was in the end withdrawn due to it potentially undermining the “concept and associated benefits,” and even in later years after other hijackings and attempted hijackings, these concerns are still further substantiated. Similar concerns with the security of ADS-B’s marine equivalent—the Automatic Identification System (AIS)—have also been raised (<xref ref-type="bibr" rid="ref58">Westbrook, 2023b</xref>, 2024).</p><p>A small number of academic publications exploring “practical spoofing attacks” followed the <xref ref-type="bibr" rid="ref52">Volpe (2001)</xref> report and other government-level acknowledgements. These did not appear to dwell on terrorist or hostile state motivations or intentions, but rather more criminals targeting tracked cargo on trucks for theft. But they did show how criminals with varying capabilities and expensive equipment could create false time-shifting signals after tampering with the victim’s receiver, and also in limited situations when trucks are stationary or moving no further than 30 feet from the attacker. Others demonstrated that off-the-shelf equipment, such as signal simulators and amplifiers, could be used to lock on to a victim’s receivers, making spoofing for non-state actors more plausible.</p><p>There was optimism about solving the spoofing issue, however, with low-cost countermeasures for existing GPS receivers that could complicate attacks (<xref ref-type="bibr" rid="ref53">Warner and Johnston, 2003</xref>). Spoofing in 2001 was still seen as difficult, detectable, and requiring expensive equipment that was usable only at short range by skilled and motivated attackers. The Department of Transportation noted that earlier tests were done on a limited budget and believed that better funding could enable more sophisticated attacks (<xref ref-type="bibr" rid="ref53">Warner and Johnston, 2003</xref>).</p><p>Nevertheless, Pandora’s box was opened and more and more businesses and sectors were becoming reliant on the “free” GPS service, including telecommunications, financial trading, power grids, and computer systems. There were also rapid advances in computer power which were making more possible more sophisticated and simple homemade spoofing devices utilising software and crude forms of artificial intelligence (crude by today’s standards but advanced at that time). Certain events, such as the malfunctioning of a satellite on New Year’s Day in 2004, as well as numerous military jamming events during the Iraq and Yugoslav wars, saw the issue of jamming, spoofing, and “GPS-denial” potentialities elevated.</p><p>Amid growing concerns over hostile state actors targeting the GPS constellation, President George W. Bush issued a directive stressing the need for GPS backup systems, as it was crucial to national infrastructure, security, and the economy (<xref ref-type="bibr" rid="ref7">Bush Administration, 2004</xref>). For the maritime industry, for example, where there were concerns about navigation without GPS, this included upgrading the Loran system to eLoran, a ground-based service with stronger signals, making simultaneous jamming of both systems harder. However, the Obama Administration (<xref ref-type="bibr" rid="ref16">Dong-Hui, 2010</xref>) rolled back the eLoran upgrade after the financial crisis, leaving satellite navigation as the primary system for many industries.</p><p>As predicted by some of the initial researchers, by the late 2000s the technologies required to reduce the costs and complexity of making a spoofer (and knowing how to use it and being able to conceal it) became increasingly real. A software-defined radio, which could much more easily lock on to a signal, was applied to a portable and low-cost civilian GPS spoofer (<xref ref-type="bibr" rid="ref30">Humphreys et al., 2008</xref>; <xref ref-type="bibr" rid="ref47">Su et al., 2016</xref>). In 2008, researchers from the University of Texas at Austin, in collaboration with the Cornell GPS group, made a spoofer capable of targeting civilian GPS code. The spoofer they built was able to receive live GPS signals and then replay them to the victim’s GPS receivers, but with subtly introduced incorrect navigation measurements. The spoofer could overcome then-available anti-spoofing technology, called receiver autonomous integrity monitoring (<xref ref-type="bibr" rid="ref34">Ju, 2012</xref>). In theory, the still-bulky and awkward equipment, with laptops, wires, and other components, could be miniaturised, and increasingly multiple targets as opposed to singular targets could be attacked, although they were still restricted by techno-geographical factors.</p><p>As GPS became more embedded in ever-complex systems, this similarly widened the “attack surface” as well as the motivations to jam or spoof GPS signals. This is partly because the “commercial world was heavily focused on mass-market GPS receivers—reducing cost, increasing performance—with little care about jamming” (<xref ref-type="bibr" rid="ref33">Jones, 2017</xref>). The privacy implications of tracking information were increasingly becoming more of a concern with the widespread ownership of cell phones. Jamming for privacy reasons, for avoiding tax payments (through tolls, for example) and fraud were being documented (<xref ref-type="bibr" rid="ref55">Westbrook, 2019a</xref>, 2024).</p><p>While jamming was causing some collateral impact in cities and near airports (causing mostly inconvenience) (<xref ref-type="bibr" rid="ref55">Westbrook, 2019a</xref>, 2024), perhaps the most notorious spoofing-related research that elevated the issue was when researchers successfully demonstrated that it was possible to cause a drone to crash (<xref ref-type="bibr" rid="ref35">Kerns et al., 2014</xref>) and lead a luxury yacht off its course (<xref ref-type="bibr" rid="ref2">Bhatti and Humphreys, 2017</xref>), in both cases fooling the system (drone) or the pilots (of the yacht) to correct a false deviation. This was achieved with cheap and commercially available spoofing equipment. The drone crashed and the yacht captain followed the hoax navigational information on his dashboard, leading to many different hypotheses about what an unscrupulous actor could do. Popular science research undertaken by journalists, bloggers, and ethical and grey hackers have also made the spoofing phenomenon more accessible and entertaining to various audiences (<xref ref-type="bibr" rid="ref57">Westbrook, 2023a</xref>).</p><p>Non-state actors have long used jamming to disrupt communications. Al Qaeda used jamming in the Middle East for averting surveillance and offensive drones, boasting of such capabilities in publicised pamphlets and magazines. A spoofing threat of destructive proportions was still, nevertheless, far-fetched. It was conceived that there were, at most, one hundred people in the world who could build a spoofer that could inflict damage on a ship or plane in the early 2010s (<xref ref-type="bibr" rid="ref39">Milner, 2017</xref>), and that the possibility of significant risk to GPS was still years away.</p><p>Government-initiated projects contributed to the accumulating work during this period. After the <xref ref-type="bibr" rid="ref52">Volpe (2001)</xref> report, the US DHS and other experts released two 2012 reports on risks to US critical infrastructure from GPS disruptions, concluding that “GNSS spoofing scenarios posed the highest threat” (<xref ref-type="bibr" rid="ref13">US DHS, 2011</xref>). Similar reports from Western governments highlighted the severe economic impacts of GPS interruptions. President Obama signed the National Defense Authorization Act in 2014, expressing concern about space system vulnerabilities (<xref ref-type="bibr" rid="ref27">GPS World, 2014</xref>). The <xref ref-type="bibr" rid="ref49">Trump Administration (2021)</xref> followed with Space Policy Directive 7, emphasising GPS resilience, while agencies like the DHS and the National Science Foundation increased grants and guidance from 2018 onward. The Biden Administration followed with key funding commitments (<xref ref-type="bibr" rid="ref25">Goward, 2021</xref>).</p><p>The status today shows that the threat posed by non-state actors to GPS-reliant and GPS-dependent systems is both evidence- and theory-based. There are several reports indicating up to and beyond 2000% increase in RFI over previous years (<xref ref-type="bibr" rid="ref26">Goward, 2023</xref>; <xref ref-type="bibr" rid="ref60">Westbrook, 2024</xref>). The threat actors have diversified and now include gamers, privacy seekers, quiet seekers, grey/black hats, activists, businesses, terrorists, cyber mercenaries, lone wolves, or state actors arming non-state actors with advanced electronic warfare (EW) technologies (<xref ref-type="bibr" rid="ref57">Westbrook, 2023a</xref>, 2024). The motives and incentives have expanded as GPS has metamorphosed to include intimidation, harassment, economic damage, tax avoidance, fraud, and physical encroachments for hijackings, sanctions evasion, reconnaissance, and sabotage (<xref ref-type="bibr" rid="ref58">Westbrook, 2023b</xref>, 2024). Spoofing and jamming strategies have also diversified, including cyber-physical encroachments, decoy tactics, and jamming-enabled crime (<xref ref-type="bibr" rid="ref57">Westbrook 2023a</xref>, 2024). The opportunity costs are immeasurable. For example, the promising benefits of (semi-)autonomous aerial vehicles, UAV deliveries, or smart city initiatives for improved quality of life and sustainable development are arguably being held back by the electronic and cyber threat against GPS (<xref ref-type="bibr" rid="ref60">Westbrook 2024</xref>). The lost financial and economic growth opportunities are similarly immeasurable. Although the economic and societal benefits of GPS’s ubiquity are tremendous, considerable costs and efforts have gone into the manufacture, use, and updates of countermeasures, both technological and procedural (<xref ref-type="bibr" rid="ref60">Westbrook, 2024</xref>).</p><p>In summary, numerous government actions have followed the liberalisation of GPS, and there is considerably more knowledge about the prevalence and consequences of intentional and collateral radio interference than what was known in 2001, and the users and intentions are also now better understood. As GPS became more embedded in ever-complex systems, this similarly widened the “attack surface” as well as the motivations to jam or spoof GPS signals.</p></sec><sec id="S5" sec-type="results"><title>Results—The status of the RFI threat today</title><sec id="S5_1"><title>The accessibility of RFI devices</title><p>Spoofing devices are accessible not least because there are a number of how-to-build guides online in writing, podcasts, and via videos (with instructions of what hardware and software are required). There are several types of spoofing equipment, including repeaters, errant signals, collateral spoofers, and targeted spoofers (<xref ref-type="bibr" rid="ref19">Fernández-Hernández et al., 2019</xref>) and the required materials and components (appropriate for certain targeted spoofing tasks) are easily accessible. These include software-defined radios (SDRs), TX (like BladeRF, HackRF, and USRP), Raspberry Pi’s, and aluminium foil (to make a faraday cage), much of which can be ordered online.</p><p>User-friendly GPS simulators are used by companies to test their systems. These simulators can be used to create spoofing devices, are used by various companies to test whether their GPS receivers are available to buy or rent from suppliers without a license. The production of jammers has a niche but healthy market, driven largely by high demand from certain individuals (privacy seekers), businesses, and organisations (like theatres wanting to silence cell phones), prisons (to deny use of cell phone contraband), and diplomatic services (to prevent eavesdropping) (<xref ref-type="bibr" rid="ref55">Westbrook, 2019a</xref>, 2019b).</p><p>The codes required to target signals are also available in online repositories like GitHub. Such guides have been published by tech hobbyists and hackers (usually following hacker conventions), and have been proven to be accurate by university researchers (albeit in some cases with slight modifications). Other materials are accessible via various hacker conventions and chat rooms. All in all, this is a vast change from over a decade ago when “malicious spoofers needed a special-purpose device coupled with high cost and high complexity in order to perform” spoofing attacks (<xref ref-type="bibr" rid="ref32">Jansen, 2018</xref>).</p></sec><sec id="S5_2"><title>The affordability of RFI devices</title><p>Spoofers and jammers are also now very cheap. The latter can cost around UAUS$200, and the former as little as US$50. But spoofers and jammers for certain tasks may require additional modifications that raise the price. Jammers, for example, can be made for special purposes, such as concealment, for mounting in vehicles, or inside the hood of a vehicle with battery connectors (<xref ref-type="bibr" rid="ref20">G4S Global, 2017</xref>). Some jammers can only target one frequency whereas more sophisticated ones can target others provided by Galileo and GLONASS—the European and Russian constellations.</p><p>When we consider “time as money,” it may also require different numbers of “attackers” or accomplices to use successfully, as well as time to put the contraptions together and test them. It could be a “matter of a few days,” for example, to “completely replicate the entire GNSS satellite system transmission” with a purchased SDR (Roi Mitt in <xref ref-type="bibr" rid="ref37">Lo, 2019</xref>). It has been argued that it “…would be something that would only takes a few hours for someone who has a little bit of experience with radio frequency work” (<xref ref-type="bibr" rid="ref5">Brunker, 2016</xref>).</p><p>The publicised costs of certain contraptions, either purpose-built or sold in various parts, could easily have risen or fallen in price as competition, demand, inflation, etc. change (see <xref ref-type="table" rid="T1">Table 1</xref>). For example, a successful attack on a drone in 2012 cost US$1,000. Attacking a vessel in 2013 with different equipment would cost US$2,000. Since then, researchers have demonstrated successful attacks on drones and other systems with US$200 devices.</p><table-wrap id="T1" orientation="portrait" position="float"><label>Table 1</label><caption><p>Equipment and manpower required for spoofing devices over time.</p></caption><table frame="border" rules="groups"><thead valign="top"><tr><th align="left">Manpower</th><th align="left">Cost of equipment</th></tr></thead><tbody valign="top"><tr><td align="left">One assistant professor, two postgraduate students, or “anybody technically skilled…”</td><td align="left">US$1,000 UAV spoofer in 2012 (<xref ref-type="bibr" rid="ref3">Bhatti <italic>et al</italic>., 2012</xref>; Noel Sharkey in <xref ref-type="bibr" rid="ref1">BBC News, 2012</xref>).</td></tr><tr><td align="left">One assistant professor and one postgraduate student</td><td align="left">US$2,000–$3,000 spoofer in 2013 (<xref ref-type="bibr" rid="ref2">Bhatti and Humphreys, 2017</xref>).</td></tr><tr><td align="left">Two researchers from an Internet security company</td><td align="left">US$300 in 2015 (<xref ref-type="bibr" rid="ref29">Huang and Yang, 2015</xref>).</td></tr><tr><td align="left">Undisclosed number of “researchers,” including a PhD student, a professor, and security consultant</td><td align="left">More than US$90,000 for surface vehicle in 2016 (<xref ref-type="bibr" rid="ref40">pzdupe1 [pseudonym], 2016</xref>).</td></tr><tr><td align="left">Eight researchers</td><td align="left">US$223 in 2018 (Zeng <italic>et al</italic>., 2018).</td></tr><tr><td align="left">Four researchers</td><td align="left">US$600 (SDR) targeting instrument landing system in 2018 (<xref ref-type="bibr" rid="ref43">Sathaye <italic>et al</italic>., 2019</xref>).</td></tr></tbody></table></table-wrap><p>It is important to note that those making spoofers were not necessarily attempting to do so with limited manpower. Nonetheless, it can be assumed that at least two individuals can make a reliable and workable spoofing device.</p></sec><sec id="S5_3"><title>The usability of RFI devices</title><p>To expand on works regarding sophistication mentioned in the Introduction (<xref ref-type="bibr" rid="ref11">Denning, 2000</xref>; <xref ref-type="bibr" rid="ref30">Humphreys et al., 2008</xref>; <xref ref-type="bibr" rid="ref41">Ranganathan et al., 2016</xref>; Shepard et al.et al., 2012; <xref ref-type="bibr" rid="ref61">Zeng et al., 2018</xref>), the “unsophisticated” user, for example, is one that does not need advanced knowledge of the radio spectrum but can execute a spoofing attack with the right equipment—equipment that is “low complexity,” portable and easy to use (<xref ref-type="bibr" rid="ref41">Ranganathan et al., 2016</xref>), using easy or accessible instructions. Different RFI devices will need actors of different levels of “sophistication.” For the purpose of this study, we focus on the simplest spoofing devices.</p><p>Given the ease of use of today’s spoofer contraptions, here we narrow them down to the typically US$200 SDR spoofer used at hackathons. The SDRs are easily tuneable to replicate a GPS signal/code. Overall, in the space of 4 years, it was believed that the “difficulty of mounting a spoofing attack has dropped by maybe a factor of a hundred since 2012” (<xref ref-type="bibr" rid="ref5">Brunker, 2016</xref>).</p><p>However, ease of use can of course vary by the location, tactics, and victim(s) being targeted. A single person may be able to affect multiple receivers with a jammer or collateral spoofer, but with the aid of a co-attacker, it may be easier to achieve accurate distance, trajectory of victim, and line of sight challenges if targeting a certain receiver (<xref ref-type="bibr" rid="ref41">Ranganathan et al., 2016</xref>). If the victim has certain systemic and procedural countermeasures (alarms, detection, and back-up systems), further assistance and technical expertise may be required.</p><p>Certain types of spoofing may require more specialist “step-by-step” planning and resources in order to make the attack successful (see <xref ref-type="table" rid="T2">Table 2</xref>), and something akin to the skillset of a simple spoofer. The attacker often has to have the ability to “real-time track and synchronise with the original signals at the victim’s location.” The second step often requires the attacker to “manipulate the GPS receiver by either shifting the signals” in their arrival time or modifying the navigation messages (<xref ref-type="bibr" rid="ref61">Zeng et al., 2018</xref>). A “smooth takeover begins by transmitting signals synchronised with the original ones and then gradually overpowering the original signal to cause the migration” (<xref ref-type="bibr" rid="ref61">Zeng et al., 2018</xref>, p. 1530). It would take a lot of skill to temporarily shift a time of arrival in real time, and introduce a time delay to induce a navigational error (<xref ref-type="bibr" rid="ref41">Ranganathan et al., 2016</xref>; <xref ref-type="bibr" rid="ref61">Zeng et al., 2018</xref>).</p><table-wrap id="T2" orientation="portrait" position="float"><label>Table 2</label><caption><p>Changes in cost in tandem with resources required and likelihood of use.</p></caption><table frame="border" rules="groups"><thead valign="top"><tr><th align="left">Year</th><th align="left">Cost</th><th align="left">Resources</th><th align="left">Likelihood of malicious end-use against civilians</th><th align="left">Academic and governmental interest</th></tr></thead><tbody valign="top"><tr><td align="left">2001</td><td align="left">Very high</td><td align="left">Highly specialised computer science backgrounds</td><td align="left">Low</td><td align="left" rowspan="2">Concept stage (disputable) and proof of concept</td></tr><tr><td align="left">2008</td><td align="left">High</td><td align="left">Strong computer science backgrounds</td><td align="left">Low to medium</td></tr><tr><td align="left">2012</td><td align="left">Low</td><td align="left">General computer science backgrounds</td><td align="left">Medium</td><td align="left" rowspan="2">Evidence-based practice. Evident use “in the wild” and counter-measures</td></tr><tr><td align="left">2015</td><td align="left">Very low</td><td align="left">Online manual, some science background, downloadable spoofing apps</td><td align="left">High to very high</td></tr></tbody></table></table-wrap><p>Separate from the US$200 spoofer, there are other advanced spoofers used by more “sophisticated” and motivated actors, which are more difficult to construct and use, but also more difficult for the victim to detect (<xref ref-type="bibr" rid="ref31">Jafarnia-Jahromi et al., 2012</xref>). Perhaps the most sophisticated actors and equipment are needed for “multi-antennae” attacks, otherwise known as a “sophisticated coordinated spoofing attack” (<xref ref-type="bibr" rid="ref30">Humphreys et al., 2008</xref>). These attacks utilise multiple coordinated and synchronised spoofing devices which give the attacker(s) “more freedom for the transmission of signals and [they] can send potentially different signals from various locations” (<xref ref-type="bibr" rid="ref48">Tippenhauer et al., 2011</xref>).Such attacks are “the most complex to implement and deploy, the most expensive (both in hardware costs and in developer efforts) and the hardest to defend against” (<xref ref-type="bibr" rid="ref30">Humphreys et al., 2008</xref>).</p><p>The attacker will also need to know when the spoofing has succeeded and try not to lose the lock—a skill in itself. The “takeover phase” and “post-capture control” of a spoofing attack are key phrases used to describe when a system is “hypnotised” or a person is fooled by incorrect information. Spoofing a UAV, for example, will require the attacker to specify the “UAV’s position and velocity estimates” before manipulating them (<xref ref-type="bibr" rid="ref35">Kerns et al., 2014</xref>). As for targeting a vessel, <xref ref-type="bibr" rid="ref46">Shepard et al. (2012)</xref> argue that “[t]here is a point when the spoofed signals have moved more than 600 meters in position or 2 microseconds in time away from the authentic signals, [and] the receiver can be considered completely owned by the spoofer.” The attacker may also have to know the distance from him/herself to the victim and avoid misalignment between arrivals of the signal from the antennas (<xref ref-type="bibr" rid="ref48">Tippenhauer et al., 2011</xref>). Being that stealth is important, the higher the offset, the greater the likelihood that this may cause “a noticeable jump” in the victim’s reported position (<xref ref-type="bibr" rid="ref48">Tippenhauer et al., 2011</xref>, p. 10).</p></sec><sec id="S5_4"><title>The transportability and concealment of RFI devices</title><p>Jammers can be barely the circumference of a cell phone, and a spoofer could be about the length and width of a pen (<xref ref-type="bibr" rid="ref61">Zeng et al., 2018</xref>), which make them easy to transport and conceal. Bulkier specialist equipment could fit into a briefcase. To improve concealability, systems can be separated into various parts and components, and reassembled later (<xref ref-type="bibr" rid="ref56">Westbrook, 2019b</xref>). Media have also reported that a sophisticated eight-antenna jamming device was built into a suitcase (<xref ref-type="bibr" rid="ref5">Brunker, 2016</xref>). Size matters for other reasons, too, particularly involving attacks where the spoofer or related equipment needs to be planted in the victim’s vehicle/location. These are sometimes referred to as static spoofers or “limpet spoofers.” For example, one study found that with a Raspberry Pi platform, a HackRF One SDR, a portable power source and an antenna and other components, small enough to fit in one hand and costing no less than US$250, can be planted inside a targeted car or operated from a following car. Bulkier and heavier spoofers can, of course, benefit by having high-power amplifiers, “which can help them generate strong spoofing signals to compromise distant receivers” (<xref ref-type="bibr" rid="ref36">Khan et al., 2021</xref>).</p></sec><sec id="S5_5"><title>The effectiveness of RFI devices</title><p>The effectiveness (or “bang for your buck”) of jammers and spoofers is ambiguous and depends on the target, motivation, and required outcomes.</p><p>But if the motivation is to achieve the seven Ds (degrade, deny, delay, deter, detect, distract, and destroy), or if it requires “covert capture” (e.g., with the user not knowing they are being fed incorrect navigation information), then certain low-cost and available spoofers could prove effective for certain tasks. Homemade spoofers can transmit on frequencies covering most of the radio spectrum used in modern technology. Even at low power levels (a minimum of 2-dB power is an advantage (<xref ref-type="bibr" rid="ref36">Khan et al., 2021</xref>, p. 22), spoofers and jammers are able to affect some commercial and widely used UAVs (<xref ref-type="bibr" rid="ref44">Sathyamoorthy et al., 2020</xref>), which for some attackers might be enough to avert surveillance, affect emergency responders, and such. The cheapest spoofer will be able to penetrate materials like walls, and the target device will likely be able to “latch onto the false signals without losing connections” (<xref ref-type="bibr" rid="ref61">Zeng et al., 2018</xref>). Getting more bang for your buck, attackers can use directional antennae or collateral ones depending on their intentions. If the victim is far away, they can use “antennas with wide-beam propagation patterns” (<xref ref-type="bibr" rid="ref32">Jansen, 2018</xref>) or use a transmitter and a large amplifier on a hill top or a tall tower.</p><p>Line of sight is important, and the need to overcome physical obstructions and power lines may limit the chances of success. Two types of spoofing can be equally effective. There is measurement spoofing, which introduces “RF waveforms that cause the target receiver to produce incorrect measurements of time of arrival or frequency of arrival or their rates of change,” and data spoofing, which “introduces incorrect digital data to the target receiver for its use in processing of signals and the calculation of PNT [positioning, navigation, and timing]. Either type of spoofing can cause a range of effects, from incorrect outputs of PNT to receiver malfunction” (<xref ref-type="bibr" rid="ref50">US DHS, 2016</xref>).</p><p>In all tests recently completed, the data in <xref ref-type="table" rid="T3">Table 3</xref> indicates that attackers can execute a successful attack from very far away, albeit in the right conditions. Although the test on the vessel was onboard, at sea there is a significant opportunity to have light of sight and thus vessels can be targeted from a significant distance.</p><table-wrap id="T3" orientation="portrait" position="float"><label>Table 3</label><caption><p>Successful spoofing attacks and ranges based on victim and types of spoofers (based on available research).</p></caption><table frame="border" rules="groups"><thead valign="top"><tr><th align="left">Type of vehicle</th><th align="left">Range</th></tr></thead><tbody valign="top"><tr><td align="left" rowspan="3">Road vehicle</td><td align="left">0.05 km (Zeng <italic>et al</italic>., 2018)</td></tr><tr><td align="left">1.2 km (<xref ref-type="bibr" rid="ref45">Schneier,2008</xref>)</td></tr><tr><td align="left">10 km (provided you have line of sight) (<xref ref-type="bibr" rid="ref4">Bradbury, 2019</xref>; <xref ref-type="bibr" rid="ref42">Regulus, 2019</xref>)</td></tr><tr><td align="left" rowspan="3">UAV</td><td align="left">0.62 km (Kerns <italic>et al</italic>., 2014)</td></tr><tr><td align="left">0.48 km (<xref ref-type="bibr" rid="ref34">Ju, 2012</xref>)</td></tr><tr><td align="left">20–30 km away (provided you have line of sight), or 2 km at sea (<xref ref-type="bibr" rid="ref18">Farivar (2013</xref>; <xref ref-type="bibr" rid="ref3">Bhatti <italic>et al</italic>.2012</xref>)</td></tr><tr><td align="left">Vessel</td><td align="left">&lt;0.01 km (onboard) (<xref ref-type="bibr" rid="ref18">Farivar, 2013</xref>)</td></tr></tbody></table></table-wrap></sec></sec><sec id="S6" sec-type="conclusions"><title>Conclusions</title><p>The literature review of the events and government actions over the years has demonstrated that non-state actors’ use of jamming and spoofing technologies has conformed to some aspects of the “stress-based cyber terrorism effect” proposed by <xref ref-type="bibr" rid="ref28">Gross et al. (2017)</xref>. Through government actions, tests by researchers, and reports from “the wild,” the risk perception of spoofing and jamming has increased, and confidence in GPS has been challenged in all industries, with direct and high-level references to national security. There is a strong kinetic element to electronic interference, whether an attack is an ends to means (direct kinetic) or means to ends (to enable physical attacks). Actors with some level of knowledge of the radio spectrum have also reached the level of “advanced-structured” according to Denning’s (2000) categorisations, and this has become possible within only two decades. Within roughly 10 years, what was only possible to a handful of highly educated engineers (operating under limited conditions) has now become possible for anyone with a comprehension of the radio spectrum.</p><p>Where was the tipping point of this transition? While jamming is seen as relatively unsophisticated in most cases, between 2008 and 2015, the availability of a multipurpose, low cost, portable, and concealable spoofing device requiring one to two persons to operate became a reality. This was during a period of expansion of GPS-dependent and GPS-aided services and systems in many industries, in concurrence with the miniaturisation and versatility of software-defined radios and computer systems, such as the Raspberry PI. With the ubiquity of GPS, combined with the availability of unsophisticated (jammers) and semi-sophisticated (spoofers) systems, this has increased the likelihood of end-use, with evidence demonstrating up to and beyond a 2,000% increase in RFI in some sectors over a short period.</p><p>It is also important to emphasise that the combination of war, the expansion of digitalisation, the commercialisation of military systems, and the demand and supply that feeds technological innovations, has left us with an entirely different threat picture than in 2001. The commercialisation and hence ubiquity and variety of GNSS-aided/dependent systems has opened the attack surface for a range of potential attackers.</p><p>How the ends justify the means for spoofing and jamming, however, is deeply contextual and cannot be concluded with broad strokes. Some tactics and intentions are strategically rational for one actor and strategically unwise and devoid of general benefits for another. What $200 RFI devices do, at least, is allow the option to choose what is “rational” in accordance with the actors’ specific situation, opportunistically, and dynamically in ever-changing criminal as well as geopolitical and social landscapes.</p><p>Simply put, what has not been established is whether the potential harm they can do (and other “rewards”) is sufficient to warrant the effort (motivation) for extremist groups. Indeed, terrorist groups have long been considered “conservative” in their weapon and target choices—choosing bombs, firearms, knives, and cars above all else to target people, buildings, and infrastructure. We know that groups will use the Internet to spread fear and boast of their activities, but the Internet does not have the same kinetic expression. The open-source GPS system, used by civilian actors, at least helps us identify on the likely civilian targets. However, whether spoofing and jamming may supplement more “traditional” forms of political violence is, up to now, a theoretical question that requires further investigation.</p><p>Indeed, while anti-jamming GPS technologies have their roots in the Cold War, the market for GPS-jamming and GPS-spoofing countermeasures, including intrusion detection systems, in both military and civilian sectors, has flourished and still maintains the status quo, arguably making it increasingly difficult for criminals to keep pace without assistance and educated knowledge of the radio spectrum. Upon reflection, if innovations like this can happen within 20 years, what will 2045 look like? Indeed, as new technologies evolve through time, violent political actors will, in their asymmetrical nature, evolve too.</p></sec></body><back><sec id="S7" sec-type="financial-disclosure"><title>Funding</title><p>This research received no external funding.</p></sec><sec id="S8"><title>Data Availability Statement</title><p>Not applicable.</p></sec><sec id="S9" sec-type="COI-statement"><title>Disclosure statement</title><p>No potential conflict of interest was reported by the author. The author read and agreed to the published version of the manuscript.</p></sec><ref-list><ref id="ref1"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>BBC News</collab></person-group> (<year>2012</year>) ‘<article-title>Researchers use spoofing to “hack” into a flying drone’, 29 June</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.bbc.co.uk/news/technology-18643134">www.bbc.co.uk/news/technology-18643134</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref2"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bhatti</surname>, <given-names>J.A</given-names></string-name>., and <string-name><surname>Humphreys</surname>, <given-names>T.E</given-names></string-name></person-group>. (<year>2017</year>) <article-title>‘Hostile control of ships via false GPS signals: Demonstration and detection navigation’</article-title>, <source>Journal of the Institute of Navigation</source>, <volume>64</volume>(<issue>1</issue>), pp. <fpage>51</fpage>–<lpage>66</lpage>. doi: <pub-id pub-id-type="doi">10.1002/navi.183</pub-id>.</mixed-citation></ref><ref id="ref3"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Bhatti</surname>, <given-names>J.A</given-names></string-name>., <string-name><surname>Shepard</surname>, <given-names>D.P</given-names></string-name>., and <string-name><surname>Humphreys</surname>, <given-names>T.E</given-names></string-name></person-group>. (<year>2012</year>) <article-title>‘Drone hack: Spoofing attack demonstration on a civilian unmanned aerial vehicle’</article-title>, <source><italic>Aviation</italic> (August)</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://radionavlab.ae.utexas.edu/images/stories/files/papers/drone_hack_shepard.pdf">https://radionavlab.ae.utexas.edu/images/stories/files/papers/drone_hack_shepard.pdf</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref4"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Bradbury</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘Tesla 3 navigation system fooled with GPS spoofing’</article-title>, <source><italic>Naked Security</italic></source>, 27 June. Available at: <ext-link ext-link-type="uri" xlink:href="https://nakedsecurity.sophos.com/2019/06/27/researchers-fool-tesla-3-navigation-system-with-gps-spoofing/">https://nakedsecurity.sophos.com/2019/06/27/researchers-fool-tesla-3-navigation-system-with-gps-spoofing/</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref5"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Brunker</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2016</year>) <article-title>‘GPS under attack as crooks, rogue workers wage electronic war’</article-title>, <source><italic>NBC News</italic></source>, 8 August. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.nbcnews.com/news/us-news/gps-under-attack-crooks-rogue-workers-wage-electronic-war-n618761">https://www.nbcnews.com/news/us-news/gps-under-attack-crooks-rogue-workers-wage-electronic-war-n618761</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref6"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Büchel</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Schwerdtfeger</surname>, <given-names>B</given-names></string-name>., <string-name><surname>Pohle</surname>, <given-names>R</given-names></string-name>., <string-name><surname>Aust</surname>, <given-names>D</given-names></string-name>., <string-name><surname>Bollmann</surname>, <given-names>C</given-names></string-name>., and <string-name><surname>Arndt</surname>, <given-names>H.J</given-names></string-name></person-group>. (<year>1999</year>) <article-title>‘Evaluation of the high power electromagnetic pulse threat for information systems and infrastructures’</article-title>, <source>Proceedings of the 13th International Zurich Symposium and Technical Exhibition on Electromagnetic Compatibility, 16–18 February</source>, <publisher-loc>Zurich, Switzerland</publisher-loc>, pp. <fpage>1</fpage>–<lpage>17</lpage>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.tib.eu/en/search/id/TIBKAT%3A266621848/">https://www.tib.eu/en/search/id/TIBKAT%3A266621848/</ext-link> (Accessed: 7 January 2025).</mixed-citation></ref><ref id="ref7"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Bush</surname><given-names>Administration</given-names></string-name></person-group> (<year>2004</year>) <article-title><italic>NSPD-39: US space-based position, navigation, and timing policy fact sheet</italic>, National Security Presidential Directives [NSPD], 15 December</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://fas.org/irp/offdocs/nspd/nspd-39.htm">https://fas.org/irp/offdocs/nspd/nspd-39.htm</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref8"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Clarke</surname>, <given-names>R.V</given-names></string-name>., and <string-name><surname>Newman</surname>, <given-names>G.R</given-names></string-name></person-group>. (<year>2006</year>) <chapter-title><italic>Outsmarting the terrorists</italic></chapter-title>. <publisher-loc>Westport, CT</publisher-loc>: <publisher-name>Praeger Security International</publisher-name>.</mixed-citation></ref><ref id="ref9"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Communication from the Commission to the European Parliament and the Council</collab></person-group> (<year>2002</year>) <article-title><italic>State of progress of the Galileo programme (COM(2002) 518 final, 248/02)</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52002DC0518&amp;from=FR">https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52002DC0518&amp;from=FR</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref10"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Cronin</surname>, <given-names>A.K</given-names></string-name></person-group>. (<year>2020</year>) <chapter-title><italic>Power to the people: How open technological innovation is arming tomorrow’s terrorists</italic></chapter-title>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Oxford University Press</publisher-name>.</mixed-citation></ref><ref id="ref11"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Denning</surname>, <given-names>D.E</given-names></string-name></person-group>. (<year>2000</year>) <article-title><italic>‘Cyberterrorism’, testimony before the special oversight panel on terrorism committee on armed services US House of Representatives, 23 May</italic></article-title>. Available via Wayback Machine at: <ext-link ext-link-type="uri" xlink:href="https://web.archive.org/web/20140310162011/http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html">https://web.archive.org/web/20140310162011/http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref12"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Department of Homeland Security</collab></person-group> (<year>2003</year>) <article-title><italic>The threat of radio frequency weapons to critical infrastructure facilities</italic></article-title>. <source>TSWG and DTEO Publication</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://apps.dtic.mil/sti/citations/ADA593293">https://apps.dtic.mil/sti/citations/ADA593293</ext-link> (Accessed: 07 January 2025).</mixed-citation></ref><ref id="ref13"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Department of Homeland Security</collab></person-group> (<year>2011</year>) <article-title><italic>National risk estimate: Risks to US critical infrastructure from global positioning system disruptions</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://rntfnd.org/wp-content/uploads/DHS-National-Risk-Estimate-GPS-Disruptions.pdf">https://rntfnd.org/wp-content/uploads/DHS-National-Risk-Estimate-GPS-Disruptions.pdf</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref14"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Department of Homeland Security</collab></person-group> (<year>2012</year>) <article-title><italic>National risk estimate: Risks to US critical infrastructure from global positioning system disruptions</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.gps.gov/news/2013/06/2013-06-NRE-fact-sheet.pdf">https://www.gps.gov/news/2013/06/2013-06-NRE-fact-sheet.pdf</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref15"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Dolnik</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2007</year>) <chapter-title><italic>Understanding terrorist innovation: Technology, tactics and global trends</italic></chapter-title>. <publisher-loc>Abingdon</publisher-loc>: <publisher-name>Routledge</publisher-name>.</mixed-citation></ref><ref id="ref16"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dong-Hui</surname>, <given-names>Y</given-names></string-name></person-group>. (<year>2010</year>) <article-title>‘Study of alternative navigation systems for GNSS in South Korea’</article-title>, <source>Journal of Information and Communication Convergence Engineering</source>, <volume>8</volume>(<issue>5</issue>), pp. <fpage>524</fpage>–<lpage>527</lpage>. doi: <pub-id pub-id-type="doi">10.6109/jicce.2010.8.5.524</pub-id>.</mixed-citation></ref><ref id="ref17"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Evan</surname>, <given-names>T</given-names></string-name>., <string-name><surname>Leverett</surname>, <given-names>E</given-names></string-name>., <string-name><surname>Ruffle</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Coburn</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Bourdeau</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Gunaratna</surname>, <given-names>R</given-names></string-name>., and <string-name><surname>Ralph</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2017</year>) <chapter-title><italic>Cyber terrorism: assessment of the threat to insurance</italic></chapter-title>. <source>Cambridge Risk Framework Series</source>. <publisher-loc>Cambridge</publisher-loc>: <publisher-name>Cambridge Centre for Risk Studies, University of Cambridge</publisher-name>.</mixed-citation></ref><ref id="ref18"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Farivar</surname>, <given-names>C</given-names></string-name></person-group>. (<year>2013</year>) <article-title>‘Professor fools $80M superyacht’s GPS receiver on the high seas’</article-title>, <source><italic>Ars Technica</italic>, 30 July</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://arstechnica.com/information-technology/2013/07/professor-spoofs-80m-superyachts-gps-receiver-on-the-high-seas/">https://arstechnica.com/information-technology/2013/07/professor-spoofs-80m-superyachts-gps-receiver-on-the-high-seas/</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref19"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Fernández-Hernández</surname>, <given-names>I</given-names></string-name>., <string-name><surname>Walter</surname>, <given-names>T</given-names></string-name>., <string-name><surname>Alexander</surname>, <given-names>K</given-names></string-name>., <string-name><surname>Clark</surname>, <given-names>B</given-names></string-name>., <string-name><surname>Châtre</surname>, <given-names>E</given-names></string-name>., <string-name><surname>Hegarty</surname>, <given-names>C</given-names></string-name>., <string-name><surname>Appel</surname>, <given-names>M</given-names></string-name>., and <string-name><surname>Meurer</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘Increasing international civil aviation resilience: A proposal for nomenclature, categorization, and treatment of new interference threats’</article-title>, in <source><italic>Proceedings of the 2019 International Technical Meeting of the Institute of Navigation</italic></source>, <publisher-loc>Reston, VA</publisher-loc>, January, pp. <fpage>389</fpage>–<lpage>407</lpage>. doi: <pub-id pub-id-type="doi">10.33012/2019.16699</pub-id>.</mixed-citation></ref><ref id="ref20"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>G4S Global</collab></person-group> (<year>2017</year>) <article-title>‘Supply chain: Defeating the security watchdog’</article-title>, <source><italic>Corporate Risk Services, Intelligence Bulletin</italic></source>, Available at: <ext-link ext-link-type="uri" xlink:href="https://www.g4s.com/en-ca/-/media/g4s/canada/files/whitepapers/usa/supply_chain_defeating_the_security_watchdog.ashx?la=en&amp;hash=7682972D229DB660B9EA9A982644AB07#:~:text=In%20July%202010%2C%20British%20police,being%20tracked%20after%20the%20thefts">https://www.g4s.com/en-ca/-/media/g4s/canada/files/whitepapers/usa/supply_chain_defeating_the_security_watchdog.ashx?la=en&amp;hash=7682972D229DB660B9EA9A982644AB07#:~:text=In%20July%202010%2C%20British%20police,being%20tracked%20after%20the%20thefts</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref21"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Gerdan</surname>, <given-names>G.P</given-names></string-name>., <string-name><surname>Lucinda</surname>, <given-names>L.J.C</given-names></string-name>., and <string-name><surname>Frank</surname>, <given-names>T</given-names></string-name></person-group>. (<year>1995</year>) <article-title><italic>The effects of RF interference, multipath and signal obstruction on the GPS observables</italic></article-title>, <source>Department of Land Information, Royal Melbourne Institute of Technology</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.128.4955&amp;rep=rep1&amp;type=pdf">https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.128.4955&amp;rep=rep1&amp;type=pdf</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref22"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gill</surname>, <given-names>P</given-names></string-name></person-group>. (<year>2017</year>) <article-title>‘Tactical innovation and the provisional Irish Republican Army’</article-title>, <source>Studies in Conflict &amp; Terrorism</source>, <volume>40</volume>(<issue>7</issue>), pp. <fpage>573</fpage>–<lpage>585</lpage>. doi: <pub-id pub-id-type="doi">10.1080/1057610X.2016.1237221</pub-id>.</mixed-citation></ref><ref id="ref23"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Giri</surname>, <given-names>D.V</given-names></string-name>., <string-name><surname>Hoad</surname>, <given-names>R</given-names></string-name>., and <string-name><surname>Sabath</surname>, <given-names>F</given-names></string-name></person-group>. (<year>2020</year>) <article-title>‘The threat of intentional electromagnetic interference (IEMI)’</article-title>, in <person-group person-group-type="editor"><string-name><surname>Arduini</surname>, <given-names>F.R</given-names></string-name>. (ed.)</person-group><source><italic>High-power electromagnetic effects on electronic systems</italic></source>. <publisher-name>Pan-European Training, Research and Education Network on Electromagnetic Risk Management (PETER)</publisher-name>. Available at: <ext-link ext-link-type="uri" xlink:href="https://etn-peter.eu/2021/06/22/the-threat-of-intentional-electromagnetic-interference-iemi/">https://etn-peter.eu/2021/06/22/the-threat-of-intentional-electromagnetic-interference-iemi/</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref24"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Goward</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2016</year>) <article-title>‘Opinion: Were US sailors “spoofed” into Iranian waters?’</article-title><source><italic>The Christian Science Monitor</italic>, 15 January</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.csmonitor.com/World/Passcode/Passcode-Voices/2016/0115/Opinion-Were-US-sailors-spoofed-into-Iranian-waters">https://www.csmonitor.com/World/Passcode/Passcode-Voices/2016/0115/Opinion-Were-US-sailors-spoofed-into-Iranian-waters</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref25"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Goward</surname>, <given-names>D.A</given-names></string-name></person-group>. (<year>2021</year>) <article-title><italic>Averting catastrophe: Why we need to rethink GNSS vulnerability</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://rntfnd.org/wp-content/uploads/ION-Summer21-GOWARD.pdf">https://rntfnd.org/wp-content/uploads/ION-Summer21-GOWARD.pdf</ext-link> (Accessed: 07 January 2025).</mixed-citation></ref><ref id="ref26"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Goward</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2023</year>) <article-title>‘Increasing GNSS interference: UK and EU warn aviation’</article-title>, <source><italic>GPS World</italic></source>, 11 April. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.gpsworld.com/increasing-gnss-interference-uk-and-eu-warn-aviation/">https://www.gpsworld.com/increasing-gnss-interference-uk-and-eu-warn-aviation/</ext-link> (Accessed: 21 November 2024).</mixed-citation></ref><ref id="ref27"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>GPS World</collab></person-group> (<year>2014</year>) <article-title><italic>Out in front: Complements of the season</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.gpsworld.com/out-in-front-complements-of-the-season/">https://www.gpsworld.com/out-in-front-complements-of-the-season/</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref28"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gross</surname>, <given-names>M.L</given-names></string-name>., <string-name><surname>Canetti</surname>, <given-names>D</given-names></string-name>., and <string-name><surname>Vashdi</surname>, <given-names>D.R</given-names></string-name></person-group>. (<year>2017</year>) <article-title>‘Cyberterrorism: Its effects on psychological well-being, public confidence, and political attitudes’</article-title>, <source>Journal of Cybersecurity</source>, <volume>3</volume>(<issue>1</issue>), pp. <fpage>49</fpage>–<lpage>58</lpage>. doi: <pub-id pub-id-type="doi">10.1093/cybsec/tyw018</pub-id>.</mixed-citation></ref><ref id="ref29"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Huang</surname>, <given-names>L</given-names></string-name>., and <string-name><surname>Yang</surname>, <given-names>Q</given-names></string-name></person-group>. (<year>2015</year>) <article-title>‘Low-cost GPS simulator—GPS spoofing by SDR’</article-title>, <source><italic>DEFCON</italic></source> 23, 7 August. Available at: <ext-link ext-link-type="uri" xlink:href="https://infocondb.org/con/def-con/def-con-23/low-cost-gps-simulator-gps-spoofing-by-sdr">https://infocondb.org/con/def-con/def-con-23/low-cost-gps-simulator-gps-spoofing-by-sdr</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref30"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Humphreys</surname>, <given-names>T.E</given-names></string-name>., <string-name><surname>Ledvina</surname>, <given-names>B.M</given-names></string-name>., <string-name><surname>Psiaki</surname>, <given-names>M.L</given-names></string-name>., <string-name><surname>O’Hanlon</surname>, <given-names>B.W</given-names></string-name>., and <string-name><surname>Kintner</surname>, <given-names>P.M</given-names>., <suffix>Jr</suffix></string-name></person-group>. (<year>2008</year>) <article-title>‘Assessing the spoofing threat: Development of a portable GPS civilian spoofer’</article-title>, in <source><italic>Proceedings of ION GNSS</italic>, The Institute of Navigation, Savannah, Georgia</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://radionavlab.ae.utexas.edu/images/stories/files/papers/ion2008r01_for_distributionW.pdf">https://radionavlab.ae.utexas.edu/images/stories/files/papers/ion2008r01_for_distributionW.pdf</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref31"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Jafarnia-Jahromi</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Broumandan</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Nielsen</surname>, <given-names>J</given-names></string-name>., and <string-name><surname>Lachapelle</surname>, <given-names>G</given-names></string-name></person-group>. (<year>2012</year>) <article-title>‘GPS vulnerability to spoofing threats and a review of antispoofing techniques’</article-title>, <source>International Journal of Navigation and Observation</source>, July, pp. <fpage>1</fpage>–<lpage>16</lpage>. doi: <pub-id pub-id-type="doi">10.1155/2012/127072</pub-id>.</mixed-citation></ref><ref id="ref32"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Jansen</surname>, <given-names>K</given-names></string-name></person-group>. (<year>2018</year>) <article-title>‘Crowd-GPS-Sec: Leveraging crowdsourcing to detect and localize GPS spoofing attacks’</article-title>, in <source><italic>2018 IEEE Symposium on Security &amp; Privacy</italic></source>, May 21–23, <publisher-loc>San Francisco, CA</publisher-loc>. Available via YouTube at: <ext-link ext-link-type="uri" xlink:href="https://www.youtube.com/watch?v=tsrOKeIelLc">https://www.youtube.com/watch?v=tsrOKeIelLc</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref33"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Jones</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2017</year>) <article-title>‘Anti-jam technology: Demystifying the CRPA’</article-title>, <source><italic>GPS World</italic></source>, 12 April. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.gpsworld.com/anti-jam-technology-demystifying-the-crpa/">https://www.gpsworld.com/anti-jam-technology-demystifying-the-crpa/</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref34"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Ju</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2012</year>) <article-title>‘Spoofed GPS signals can be countered, researchers show’</article-title>, <source><italic>Cornell Chronicle</italic></source>, 23 July. Available at: <ext-link ext-link-type="uri" xlink:href="https://news.cornell.edu/stories/2012/07/researchers-counter-gps-spoof-attacks">https://news.cornell.edu/stories/2012/07/researchers-counter-gps-spoof-attacks</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref35"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kerns</surname>, <given-names>A.J</given-names></string-name>., <string-name><surname>Shepard</surname>, <given-names>D.P</given-names></string-name>., <string-name><surname>Bhatti</surname>, <given-names>J.A</given-names></string-name>., and <string-name><surname>Humphreys</surname>, <given-names>T.E</given-names></string-name></person-group>. (<year>2014</year>) <article-title>‘Unmanned aircraft capture and control via GPS spoofing’</article-title>, <source>Journal of Field Robotics</source>, <volume>31</volume>(<issue>4</issue>), pp. <fpage>617</fpage>–<lpage>636</lpage>. doi: <pub-id pub-id-type="doi">10.1002/rob.21513</pub-id>.</mixed-citation></ref><ref id="ref36"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Khan</surname>, <given-names>S.Z</given-names></string-name>., <string-name><surname>Mohsin</surname>, <given-names>M</given-names></string-name>., and <string-name><surname>Iqbal</surname>, <given-names>W</given-names></string-name></person-group>. (<year>2021</year>) <article-title>‘On GPS spoofing of aerial platforms: A review of threats, challenges, methodologies, and future research directions’</article-title>, <source>Peer J Computer Science</source>, <volume>7</volume>, doi: <pub-id pub-id-type="doi">10.7717/peerj-cs.507</pub-id>.</mixed-citation></ref><ref id="ref37"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Lo</surname>, <given-names>C</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘GPS spoofing: What’s the risk for ship navigation?’</article-title><source><italic>Ship Technology</italic></source>, 15 April. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.ship-technology.com/features/ship-navigation-risks/">https://www.ship-technology.com/features/ship-navigation-risks/</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref38"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Magnuson</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2007</year>) <article-title>‘Bomb making skills spread globally’</article-title>, <source><italic>National Defense</italic></source>, 1 June. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.nationaldefensemagazine.org/articles/2007/6/1/2007june-bomb-making-skills-spread-globally">https://www.nationaldefensemagazine.org/articles/2007/6/1/2007june-bomb-making-skills-spread-globally</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref39"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Milner</surname>, <given-names>G</given-names></string-name></person-group>. (<year>2017</year>) <chapter-title><italic>Pinpoint: How GPS is changing technology, culture, and our minds</italic></chapter-title>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Norton</publisher-name>.</mixed-citation></ref><ref id="ref40"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>pzdupe1 (Pseudonym)</collab></person-group> (<year>2016</year>) <article-title>‘Hackers show how they tricked a Tesla into hitting objects in its path’</article-title>, <source><italic>Business Insider</italic></source>, 8 August. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.businessinsider.com/defcon-tesla-jamming-spoofing-autopilot-2016-8?r=US&amp;IR=T">www.businessinsider.com/defcon-tesla-jamming-spoofing-autopilot-2016-8?r=US&amp;IR=T</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref41"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ranganathan</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Olafsdottir</surname>, <given-names>H</given-names></string-name>., and <string-name><surname>Capkun</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2016</year>) <article-title>‘SPREE: A spoofing-resistant GPS receiver’</article-title>, in <source><italic>Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking (MobiCom ‘16)</italic></source>, October, pp. <fpage>348</fpage>–<lpage>360</lpage>. doi: <pub-id pub-id-type="doi">10.1145/2973750.2973753</pub-id>.</mixed-citation></ref><ref id="ref42"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Regulus</collab></person-group> (<year>2019</year>) <article-title><italic>Tesla Model 3 spoofed off the highway—Regulus navigation system hack causes car to turn on its own</italic></article-title>, August 4. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.regulus.com/blog/tesla-model-3-spoofed-off-the-highway-regulus-navigation-system-hack-causes-car-to-turn-on-its-own">https://www.regulus.com/blog/tesla-model-3-spoofed-off-the-highway-regulus-navigation-system-hack-causes-car-to-turn-on-its-own</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref43"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sathaye</surname>, <given-names>H</given-names></string-name>., <string-name><surname>Schepers</surname>, <given-names>D</given-names></string-name>., <string-name><surname>Ranganathan</surname>, <given-names>A</given-names></string-name>., and <string-name><surname>Noubir</surname>, <given-names>G</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘Wireless attacks on aircraft instrument landing systems’</article-title>, <source>Proceedings of the 28th USENIX Security Symposium</source>, August 14–16, <publisher-loc>Santa Clara, CA</publisher-loc>, pp. <fpage>375</fpage>–<lpage>372</lpage>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.usenix.org/system/files/sec19-sathaye.pdf">https://www.usenix.org/system/files/sec19-sathaye.pdf</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref44"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Sathyamoorthy</surname>, <given-names>D</given-names></string-name>., <string-name><surname>Amin</surname>, <given-names>Z.F.M</given-names></string-name>., <string-name><surname>Selamat</surname>, <given-names>E</given-names></string-name>., <string-name><surname>Hassan</surname>, <given-names>S.A</given-names></string-name>., <string-name><surname>Kazmar</surname>, <given-names>A.F.A</given-names></string-name>., and <string-name><surname>Zaimy</surname>, <given-names>Z</given-names></string-name></person-group>. (<year>2020</year>) <article-title>‘Evaluation of the vulnerabilities of unmanned aerial vehicles (UAVs) to global positioning system (GPS) jamming and spoofing’</article-title>, <source><italic>Science &amp; Technology Research Institute for Defence (STRIDE), Ministry of Defence, Malaysia</italic></source>. Available via ResearchGate at: <ext-link ext-link-type="uri" xlink:href="https://www.researchgate.net/publication/345150887_EVALUATION_OF_THE_VULNERABILITIES_OF_UNMANNED_AERIAL_VEHICLES_UAVS_TO_GLOBAL_POSITIONING_SYSTEM_GPS_JAMMING_AND_SPOOFING">https://www.researchgate.net/publication/345150887_EVALUATION_OF_THE_VULNERABILITIES_OF_UNMANNED_AERIAL_VEHICLES_UAVS_TO_GLOBAL_POSITIONING_SYSTEM_GPS_JAMMING_AND_SPOOFING</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref45"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Schneier</surname>, <given-names>B</given-names></string-name></person-group>. (<year>2008</year>) <article-title>‘GPS spoofing’</article-title>, <source><italic>Schneier on Security</italic></source>, September 17. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.schneier.com/blog/archives/2008/09/gps_spoofing.html">https://www.schneier.com/blog/archives/2008/09/gps_spoofing.html</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref46"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Shepard</surname>, <given-names>D</given-names></string-name>., <string-name><surname>Wesson</surname>, <given-names>K</given-names></string-name>., and <string-name><surname>Humphreys</surname>, <given-names>T.E</given-names></string-name></person-group>. (<year>2012</year>) <article-title>‘Straight talk on anti-spoofing: Securing the future of PNT’</article-title>, <source>GPS World</source>, pp. <fpage>32</fpage>–<lpage>63</lpage>. Available at: <ext-link ext-link-type="uri" xlink:href="https://radionavlab.ae.utexas.edu/images/stories/files/papers/antiSpoofStraightTalk_Wesson.pdf">https://radionavlab.ae.utexas.edu/images/stories/files/papers/antiSpoofStraightTalk_Wesson.pdf</ext-link> (Accessed: 7 November 2023).</mixed-citation></ref><ref id="ref47"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Su</surname>, <given-names>J</given-names></string-name>., <string-name><surname>He</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Cheng</surname>, <given-names>P</given-names></string-name>., and <string-name><surname>Chen</surname>, <given-names>J</given-names></string-name></person-group>. (<year>2016</year>) <article-title>‘A stealthy GPS spoofing strategy for manipulating the trajectory of an unmanned aerial vehicle’</article-title>, <source>IFAC-Papers</source>, <volume>49</volume>(<issue>22</issue>), pp. <fpage>291</fpage>–<lpage>296</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ifacol.2016.10.412</pub-id>.</mixed-citation></ref><ref id="ref48"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Tippenhauer</surname>, <given-names>N.O</given-names></string-name>., <string-name><surname>Pöpper</surname>, <given-names>C</given-names></string-name>., <string-name><surname>Rasmussen</surname>, <given-names>K.B</given-names></string-name>., and <string-name><surname>Capkun</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2011</year>) <article-title>‘On the requirements for successful GPS spoofing attacks’</article-title>, in <source><italic>Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS ‘11)</italic></source>, 17–21 October, <publisher-loc>Chicago, IL</publisher-loc>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.cs.ox.ac.uk/files/6489/gps.pdf">https://www.cs.ox.ac.uk/files/6489/gps.pdf</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref49"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Trump Administration</collab></person-group> (<year>2021</year>) <article-title><italic>Space Policy Directive 7—The United States space-based positioning, navigation, and timing policy</italic></article-title>. 15 January. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.govinfo.gov/content/pkg/DCPD-202100025/pdf/DCPD-202100025.pdf">www.govinfo.gov/content/pkg/DCPD-202100025/pdf/DCPD-202100025.pdf</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref50"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>US DHS</collab></person-group> (<year>2016</year>) <article-title><italic>Improving the operation and development of Global Positioning System (GPS) equipment used by critical infrastructure</italic></article-title>. <source>National Cybersecurity &amp; Communications Integration Center and National Coordinating Center for Communications</source>, pp. <fpage>1</fpage>–<lpage>21</lpage>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.dhs.gov/science-and-technology/pnt-program">https://www.dhs.gov/science-and-technology/pnt-program</ext-link> (Accessed: 7 January 2025).</mixed-citation></ref><ref id="ref51"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>US Foreign Affairs, Defense, and Trade Division</collab></person-group> (<year>2008</year>) <article-title><italic>High altitude electromagnetic pulse (HEMP) and high power microwave (HPM) devices: Threat assessments</italic></article-title>, Document No. 14, 26 March. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.wired.com/images_blogs/dangerroom/files/Ebomb.pdf">https://www.wired.com/images_blogs/dangerroom/files/Ebomb.pdf</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref52"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Volpe</surname>, <given-names>J.A</given-names></string-name></person-group>. (<year>2001</year>) <article-title><italic>Vulnerability assessment of the transportation infrastructure relying on the global positioning system</italic></article-title>, <source>National Transportation Systems Center, Office of the Assistant Secretary for Transportation Policy, US Department of Transportation</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.navcen.uscg.gov/pdf/vulnerability_assess_2001.pdf">https://www.navcen.uscg.gov/pdf/vulnerability_assess_2001.pdf</ext-link> (Accessed: 07 November 2023).</mixed-citation></ref><ref id="ref53"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Warner</surname>, <given-names>J.S</given-names></string-name>., and <string-name><surname>Johnston</surname>, <given-names>R.G</given-names></string-name></person-group>. (<year>2003</year>) <article-title>‘GPS spoofing countermeasures’</article-title>, <source>Homeland Security Journal</source>, <volume>25</volume>(<issue>2</issue>), pp. <fpage>19</fpage>–<lpage>27</lpage>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.semanticscholar.org/paper/GPS-Spoofing-Countermeasures-Warner-Johnston/36e17f723bff8d429aca4714abe54500a9edaa49">https://www.semanticscholar.org/paper/GPS-Spoofing-Countermeasures-Warner-Johnston/36e17f723bff8d429aca4714abe54500a9edaa49</ext-link> (Accessed: 7 November 2023).</mixed-citation></ref><ref id="ref54"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Weimann</surname>, <given-names>G</given-names></string-name></person-group>. (<year>2004</year>) <article-title><italic>Cyberterrorism: How real is the threat?</italic></article-title>, <source>Special Report 119, United States Institute for Peace</source>, December, pp. <fpage>1</fpage>–<lpage>12</lpage>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.usip.org/sites/default/files/sr119.pdf">https://www.usip.org/sites/default/files/sr119.pdf</ext-link> (Accessed: 7 November 2023).</mixed-citation></ref><ref id="ref55"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Westbrook</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2019a</year>) <article-title>‘Will GPS jammers proliferate in the smart city?’</article-title>, <source>Salus Journal</source>, <volume>7</volume>(<issue>2</issue>), pp. <fpage>45</fpage>–<lpage>67</lpage>. Available at: <ext-link ext-link-type="uri" xlink:href="https://view.salusjournal.com/article/view/102/96">https://view.salusjournal.com/article/view/102/96</ext-link> (Accessed: 7 November 2023).</mixed-citation></ref><ref id="ref56"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Westbrook</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2019b</year>) <article-title>‘The global positioning system and military jamming: The geographies of electronic warfare’</article-title>, <source>Journal of Strategic Security</source>, <volume>12</volume>(<issue>2</issue>), pp. <fpage>1</fpage>–<lpage>16</lpage>. doi: <pub-id pub-id-type="doi">10.5038/1944-0472.12.2.1720</pub-id>.</mixed-citation></ref><ref id="ref57"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Westbrook</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2023a</year>) <article-title>‘A taxonomy of radiofrequency jamming and spoofing strategies and criminal motives’</article-title>, <source>Journal of Strategic Security</source>, <volume>16</volume>(<issue>2</issue>), pp. <fpage>68</fpage>–<lpage>80</lpage>. doi: <pub-id pub-id-type="doi">10.5038/1944-0472.16.2.2081</pub-id>.</mixed-citation></ref><ref id="ref58"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Westbrook</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2023b</year>) <article-title>‘Radiofrequency interference strategies targeting marine navigation systems: Political motives and consequences’</article-title>, <source>Journal of Baltic Security</source>, <volume>9</volume>(<issue>1</issue>), pp. <fpage>1</fpage>–<lpage>28</lpage>. doi: <pub-id pub-id-type="doi">10.57767/jobs_2023_003</pub-id>.</mixed-citation></ref><ref id="ref59"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Westbrook</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2023c</year>) <article-title>‘Trojan spoofing: A threat to critical infrastructure’</article-title>, <source>Security and Defence Quarterly</source>, <volume>42</volume>(<issue>2</issue>), pp. <fpage>1</fpage>–<lpage>15</lpage>. doi: <pub-id pub-id-type="doi">10.35467/sdq/164760</pub-id>.</mixed-citation></ref><ref id="ref60"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Westbrook</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2024</year>) <article-title>‘Aircraft vulnerability to politically motivated radiofrequency interference (RFI) in Eastern Europe’</article-title>, <source>Security and Defence Quarterly</source>, <volume>46</volume>(<issue>2</issue>), pp. <fpage>104</fpage>–<lpage>117</lpage>. doi: <pub-id pub-id-type="doi">10.35467/sdq/178249</pub-id>.</mixed-citation></ref><ref id="ref61"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zeng</surname>, <given-names>K</given-names></string-name>., <string-name><surname>Liu</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Shu</surname>, <given-names>Y</given-names></string-name>., <string-name><surname>Wang</surname>, <given-names>D</given-names></string-name>., <string-name><surname>Li</surname>, <given-names>H</given-names></string-name>., <string-name><surname>Dou</surname>, <given-names>Y</given-names></string-name>., <string-name><surname>Wang</surname>, <given-names>G</given-names></string-name>., and <string-name><surname>Yang</surname>, <given-names>Y</given-names></string-name></person-group>. (<year>2018</year>) <article-title>‘All your GPS are belong to us: Towards stealthy manipulation of road navigation systems’</article-title>, <source>Proceedings of the 27th USENIX Conference on Security Symposium</source>, August, pp. <fpage>1527</fpage>–<lpage>1544</lpage>. doi: <pub-id pub-id-type="doi">10.5555/3277203.3277318</pub-id>.</mixed-citation></ref></ref-list></back></article>
