2019
DOI: 10.5038/1944-0472.12.2.1720
|View full text |Cite
|
Sign up to set email alerts
|

The Global Positioning System and Military Jamming: The geographies of electronic warfare

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 2 publications
0
8
0
Order By: Relevance
“…Focussing on the vulnerabilities of systems and locations, the research involved an analysis of mostly academic research on spoofing as well as white/grey/black hat demonstrations, media reports, and secondary sources from these texts. The objective was to define specific spoofing tactics and strategies, with Trojan and Exposure spoofing being identified as two similar threats requiring further analysis and contextualisation (Westbrook, 2023). The results are expressed by way of a review of real and hypothetical examples of where Trojan and Exposure spoofing have been used.…”
Section: Research Question Methodology and Article Structurementioning
confidence: 99%
See 3 more Smart Citations
“…Focussing on the vulnerabilities of systems and locations, the research involved an analysis of mostly academic research on spoofing as well as white/grey/black hat demonstrations, media reports, and secondary sources from these texts. The objective was to define specific spoofing tactics and strategies, with Trojan and Exposure spoofing being identified as two similar threats requiring further analysis and contextualisation (Westbrook, 2023). The results are expressed by way of a review of real and hypothetical examples of where Trojan and Exposure spoofing have been used.…”
Section: Research Question Methodology and Article Structurementioning
confidence: 99%
“…Iran has proven to be capable of spoofing military drones to enable capture or for the justification for armed confrontation without provoking armed responses. In two known cases of Iran spoofing US drones, on both occasions an armed response was considered at higher levels in the United States (Adde, 2021;Kelley and Cenciotti, 2012;Westbrook, 2019).…”
Section: Trojan Spoofingmentioning
confidence: 99%
See 2 more Smart Citations
“…It is a very common and highly undesirable real threat. Westbrook (2019) discussed about new geographies of conflict due to the prevailing use of military-grade GPS jamming equipment by both state and non-state actors as an offensive tool of electronic warfare. Owing to the GPS signal being very weak and well below the background RF noise level measured by the receiver ( Silva, 2017 ; Van den Bergh & Pollin, 2019 ), it can be affected by the ionospheric attenuation and other factors such as the path followed by the satellite’s transmissions to the receiver and unlicensed use of the GPS band.…”
Section: Gps Threat Landscapementioning
confidence: 99%