<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Topic:spoofing &#8212; Global Security Review %</title>
	<atom:link href="https://globalsecurityreview.com/subject/spoofing/feed/" rel="self" type="application/rss+xml" />
	<link>https://globalsecurityreview.com/subject/spoofing/</link>
	<description>A division of the National Institute for Deterrence Studies (NIDS)</description>
	<lastBuildDate>Mon, 30 Jun 2025 10:39:04 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://globalsecurityreview.com/wp-content/uploads/2023/10/cropped-GSR-Banner-LogoV2-32x32.png</url>
	<title>Topic:spoofing &#8212; Global Security Review %</title>
	<link>https://globalsecurityreview.com/subject/spoofing/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Extending the Golden Dome: AUKUS Pillar 2</title>
		<link>https://globalsecurityreview.com/extending-the-golden-dome-aukus-pillar-2/</link>
					<comments>https://globalsecurityreview.com/extending-the-golden-dome-aukus-pillar-2/#respond</comments>
		
		<dc:creator><![CDATA[Natalie Treloar]]></dc:creator>
		<pubDate>Mon, 30 Jun 2025 10:39:04 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[advanced technologies]]></category>
		<category><![CDATA[allied territory]]></category>
		<category><![CDATA[anti-submarine warfare]]></category>
		<category><![CDATA[artificial intelligence (AI)]]></category>
		<category><![CDATA[AUKUS pillar two]]></category>
		<category><![CDATA[autonomy]]></category>
		<category><![CDATA[boost phase]]></category>
		<category><![CDATA[burden sharing]]></category>
		<category><![CDATA[collective defense]]></category>
		<category><![CDATA[command-and-control systems]]></category>
		<category><![CDATA[counter-hypersonics]]></category>
		<category><![CDATA[cyber capabilities]]></category>
		<category><![CDATA[cyber-reconnaissance]]></category>
		<category><![CDATA[deep-space advanced radar capability program (DARC)]]></category>
		<category><![CDATA[directed-energy platforms]]></category>
		<category><![CDATA[electromagnetic spectrum.]]></category>
		<category><![CDATA[electromagnetic weapons]]></category>
		<category><![CDATA[electronic attack]]></category>
		<category><![CDATA[electronic counter-countermeasures]]></category>
		<category><![CDATA[electronic countermeasures (ECM)]]></category>
		<category><![CDATA[electronic protection]]></category>
		<category><![CDATA[electronic warfare]]></category>
		<category><![CDATA[five-eyes countries]]></category>
		<category><![CDATA[fractional orbital bombardment system (FOBS)]]></category>
		<category><![CDATA[Golden Dome]]></category>
		<category><![CDATA[high-power lasers]]></category>
		<category><![CDATA[hypersonic glide weapons]]></category>
		<category><![CDATA[hypersonic interceptors]]></category>
		<category><![CDATA[hypersonics]]></category>
		<category><![CDATA[information sharing]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[interceptors]]></category>
		<category><![CDATA[intercontinental ballistic missiles (ICBM)]]></category>
		<category><![CDATA[jamming]]></category>
		<category><![CDATA[kinetic interceptors]]></category>
		<category><![CDATA[land-attack cruise missiles]]></category>
		<category><![CDATA[low Earth orbit (LEO) satellites]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[microwave weapons]]></category>
		<category><![CDATA[mine warfare]]></category>
		<category><![CDATA[missile defense]]></category>
		<category><![CDATA[multilayered defense network]]></category>
		<category><![CDATA[nuclear command control and communications (NC3)]]></category>
		<category><![CDATA[quantum computing]]></category>
		<category><![CDATA[quantum key distribution]]></category>
		<category><![CDATA[quantum technologies]]></category>
		<category><![CDATA[quantum-resistant cryptography]]></category>
		<category><![CDATA[regional stability]]></category>
		<category><![CDATA[sensors]]></category>
		<category><![CDATA[signals interception]]></category>
		<category><![CDATA[space-based targeting]]></category>
		<category><![CDATA[spoofing]]></category>
		<category><![CDATA[strategic deterrence]]></category>
		<category><![CDATA[submarine-launched ballistic missiles (SLBM)]]></category>
		<category><![CDATA[submarines]]></category>
		<category><![CDATA[undersea capabilities]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31074</guid>

					<description><![CDATA[<p>As the United States attempts to better understand the requirements of President Trump’s Golden Dome program, pillar two of the AUKUS agreement has the potential to help solve the “integration problem at massive scale” and provide the needed architecture for collective defense. This initiative would also prevent AUKUS pillar two from “failing in its mission” [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/extending-the-golden-dome-aukus-pillar-2/">Extending the Golden Dome: AUKUS Pillar 2</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As the United States attempts to better understand the requirements of President Trump’s Golden Dome program, pillar two of the AUKUS agreement has the potential to help solve the “<a href="https://www.csis.org/events/americas-golden-dome-explained">integration problem at massive scale</a>” and provide the needed architecture for collective defense. This initiative would also prevent AUKUS pillar two from “<a href="https://warontherocks.com/2025/06/aukus-pillar-ii-is-failing-in-its-mission-it-needs-its-own-optimal-pathway/">failing in its mission</a>” by enabling the prioritization of advanced technologies at the <a href="https://www.foreignaffairs.com/podcasts/why-america-shouldnt-underestimate-chinese-power">scale</a> required to achieve Golden Dome missile defense.</p>
<p>Golden Dome is focused on specific <a href="https://www.dia.mil/Portals/110/Documents/News/golden_dome.pdf">missile threats to the American homeland</a>. AUKUS pillar two is designed to reduce the <a href="https://ad-aspi.s3.ap-southeast-2.amazonaws.com/2023-06/PB69-CriticalTechTracker-AUKUS%20relevant%20technologies%20top%2010%20country%20snapshot.pdf">significant lead</a> China has in dual-use emerging technologies. An “extended” Golden Dome approach that produces strong and resilient allies may provide greater strategic deterrence than an America alone approach.</p>
<p>As stronger allies contribute more to collective defense through <a href="https://www.csis.org/analysis/shared-threats-indo-pacific-alliances-and-burden-sharing-todays-geopolitical-environment">burden sharing</a>, this can reduce the financial and military burden on the United States. Capable allies can deter aggression and manage local conflicts, promoting <a href="https://www.csis.org/analysis/burden-sharing-responsibility-sharing">regional stability</a> without constant American intervention.</p>
<p>If allies are seen as weak and easily overrun, it may undermine the <a href="https://researchportalplus.anu.edu.au/en/publications/alliances-and-nuclear-risk-strengthening-us-extended-deterrence">credibility of alliances and security guarantees</a>, thereby emboldening adversaries. Strong allies often bring <a href="https://carnegieindia.org/research/2024/09/innovative-alliance-us-australian-defense-science-and-technology-cooperation-for-a-dangerous-decade?lang=en">advanced technologies</a> and capabilities that enhance joint operations through interoperability and innovation.</p>
<p>Defeating fractional orbital bombardment system (FOBS), intercontinental ballistic missiles (ICBM), submarine-launched ballistic missiles (SLBM), hypersonic glide weapons, and land-attack cruise missile threats is the <a href="https://www.dia.mil/Portals/110/Documents/News/golden_dome.pdf">focus</a> of Golden Dome, which “<a href="https://www.geopoliticalmonitor.com/golden-dome-strategic-impacts-of-an-untouchable-united-states/">proposes</a> a multilayered defense network capable of intercepting threats during the boost, <a href="https://www.heritage.org/military-strength/assessment-us-military-power/missile-defense">midcourse, and terminal stages</a> of missile flight.” Some analysts argue that it is easiest to target these threats in the <a href="https://www.youtube.com/watch?v=MOVMSRxbyl4">boost/ascent phase</a>.</p>
<p>Targeting the <a href="https://www.inss.org.il/publication/interception/#:~:text=A%20COIL%20system%20(Chemical%20Oxygen,benefits%20of%20using%20a%20Zeppelin.">boost</a> phase can either occur from allied territory, targeting North Korean missiles from South Korea, or the homeland. The boost phase can also be <a href="https://www.youtube.com/watch?v=MOVMSRxbyl4">targeted from space</a>. However, targeting from space is not without its own unique set of challenges. Either way, it will not be solved by America without its allies.</p>
<p>Arguably, five-eyes countries (Australia, Canada, New Zealand, United Kingdom, and United States) are already entangled in American <a href="https://www.congress.gov/crs_external_products/IF/PDF/IF11697/IF11697.6.pdf">nuclear command, control, and communications (NC3)</a>. Furthermore, the US operates in coordination with other military forces as part of broader coalition operations. Hence, extending Golden Dome to allies is not only possible, but can further leverage the AUKUS pillar two effort. Moreover, a missile defense system consists of <a href="https://missilethreat.csis.org/sensors-command-control/">sensors, interceptors, and command-and-control systems</a> that work together to detect, track, and intercept incoming missiles.</p>
<p>These necessary components exist in AUKUS pillar two working groups like the cyber capabilities, artificial intelligence (AI) and autonomy, quantum technologies, undersea capabilities, hypersonics and counter-hypersonics, electronic warfare capabilities, innovation and information sharing, and the deep-space advanced radar capability program (DARC).</p>
<p>AUKUS pillar two leadership should prioritize the development of technologies and supporting systems for an effective extended Golden Dome architecture. America is unlikely to solve the problem in isolation by building a “<a href="https://www.geopoliticalmonitor.com/golden-dome-strategic-impacts-of-an-untouchable-united-states/">tightly integrated system of low Earth orbit (LEO) satellites, terrestrial radar stations, directed-energy platforms, and kinetic interceptors</a>” that senses, decides, and neutralizes incoming missiles. The linkages and opportunities for the prioritization of advanced technology development for missile defense can be found in the following summaries.</p>
<p>Cyber capabilities encompass both offensive and defensive operations for missile defense. Offensive cyber tools are used to deter adversaries and disrupt their operations through tactics such as cyber-reconnaissance, communication isolation, targeted strikes, and network intrusions. Defensively, military forces can prioritize robust network protection, active threat disruption, and seamless coordination across units to safeguard critical systems. Cyber operations can enhance intelligence gathering, command and control, and information warfare to shape public perception and the broader information environment. As conflict evolves, training personnel in cyber tactics and integrating machine learning for threat detection and analysis can maintain strategic advantage.</p>
<p>AI and autonomy can transform missile defense and military operations by enhancing efficiency, precision, and decision-making. Autonomous weapon systems are used for reconnaissance, surveillance, and combat missions. AI-driven wargaming platforms simulate real-world combat scenarios to help strategists test tactics and improve readiness. In command and control, AI supports real-time data processing and analysis. AI optimizes logistics by improving resource allocation, supply-chain management, and transportation.</p>
<p>In intelligence and surveillance, AI analyzes vast datasets to detect patterns and identify threats. Additionally, AI monitors threats and predicts future events. Human-machine teaming allows AI systems to collaborate with human operators, combining strengths and minimizing errors.</p>
<p>Quantum technologies transform missile defenses through enhanced security, operational efficiency, and advanced training. In cybersecurity, quantum-resistant cryptography is being developed to protect against the threat quantum computers pose to traditional encryption. Quantum key distribution offers highly secure communication by transmitting encryption keys through quantum channels, making interception nearly impossible.</p>
<p>In military operations, quantum algorithms can optimize logistics, supply chains, and battlefield strategies by analyzing complex data in real time. Quantum computing could process data in real time, enabling missile defense systems to rapidly analyze incoming threats, allowing for quicker decision-making and more effective interception. Additionally, quantum computing could enable highly accurate simulations of complex systems like nuclear reactions and weapon designs.</p>
<p>Undersea capabilities encompass a wide range of offensive and defensive functions that contribute to missile defense. Offensively, submarines and other undersea platforms can strike surface vessels, submarines, and land-based targets. They are also instrumental in inserting special forces into hostile territory for reconnaissance or sabotage missions. Undersea vehicles play a key role in mine warfare, either by laying mines or clearing minefields. On the defensive side, these platforms are vital for anti-submarine warfare, enabling the detection and neutralization of enemy submarines. They also support surveillance and reconnaissance efforts, gathering intelligence on enemy naval movements. Undersea systems help protect vital infrastructure such as pipelines and communication cables and help ensure safe navigation.</p>
<p>Hypersonic weapons and counter-hypersonic systems are vital to missile defense operations. Hypersonic glide weapons and hypersonic cruise missiles are designed to strike targets with exceptional speed, maneuverability, and precision while evading traditional defenses. Counter-hypersonic capabilities include advanced sensors and tracking systems like radar and satellite imaging to detect and monitor hypersonic weapons. Hypersonic interceptors aim to neutralize threats mid-flight, while high-power lasers and microwave weapons can disrupt their guidance systems. Effective command-and-control systems are essential for coordinating these defenses, and soft-kill measures such as cyberattacks offer additional means to interfere with hypersonic weapons.</p>
<p>Electronic warfare is fundamental for gaining military advantages in cross-domain missile defense. Electronic attack includes jamming enemy communications, radar, and navigation systems. It also includes spoofing—sending false signals to enemy forces. Electromagnetic or directed-energy weapons disable or destroy enemy assets. Electronic protection ensures secure communication through encryption and satellite links and employs electronic countermeasures (ECM) to defend against attack. Electronic counter-countermeasures are used to overcome enemy ECM and maintain operational effectiveness. Electronic support can be focused on gathering intelligence through signals interception, using sensors for surveillance and target acquisition, and detecting threats in the electromagnetic spectrum.</p>
<p><em>            In short, under the auspices of AUKUS pillar two, Australia and the United Kingdom can contribute to Golden Dome in ways that many may not be thinking about. As longtime allies with a shared culture, history, and values, working together on Golden Dome just makes sense. </em></p>
<p><em>Natalie Treloar is a Senior Analyst at the National Institute for Deterrence Studies (NIDS), a Non-Resident Fellow at the Indo-Pacific Studies Center (IPSC), the Australian Company Director of Alpha-India Consultancy, and a cohost of the NIDS Deterrence Down Under Podcast.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/06/Extending-the-Golden-Dome-AUKUS-Pillar-2-and-the-Architecture-of-Collective-Defense.pdf"><img decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="173" height="48" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 173px) 100vw, 173px" /></a></p>
<p><a href="https://globalsecurityreview.com/extending-the-golden-dome-aukus-pillar-2/">Extending the Golden Dome: AUKUS Pillar 2</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/extending-the-golden-dome-aukus-pillar-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How Diplomacy Can Save GPS</title>
		<link>https://globalsecurityreview.com/how-diplomacy-can-save-gps/</link>
					<comments>https://globalsecurityreview.com/how-diplomacy-can-save-gps/#respond</comments>
		
		<dc:creator><![CDATA[Dana Goward]]></dc:creator>
		<pubDate>Mon, 16 Dec 2024 13:14:33 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[aircraft]]></category>
		<category><![CDATA[aviation safety]]></category>
		<category><![CDATA[Dana Goward ​]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[disruption]]></category>
		<category><![CDATA[drones]]></category>
		<category><![CDATA[electrical grids]]></category>
		<category><![CDATA[fiber cable]]></category>
		<category><![CDATA[GNSS]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[interference]]></category>
		<category><![CDATA[international diplomacy]]></category>
		<category><![CDATA[international standards]]></category>
		<category><![CDATA[ITU]]></category>
		<category><![CDATA[jamming]]></category>
		<category><![CDATA[maritime navigation]]></category>
		<category><![CDATA[navigation]]></category>
		<category><![CDATA[PNT]]></category>
		<category><![CDATA[resilient navigation]]></category>
		<category><![CDATA[resilient PNT]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[rockets]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[satellite signals]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[sovereignty]]></category>
		<category><![CDATA[spoofing]]></category>
		<category><![CDATA[technical assistance]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[telecommunications]]></category>
		<category><![CDATA[terrestrial broadcast]]></category>
		<category><![CDATA[terrestrial systems]]></category>
		<category><![CDATA[timing]]></category>
		<category><![CDATA[timing foundation]]></category>
		<category><![CDATA[transportation systems]]></category>
		<category><![CDATA[United Nations]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29615</guid>

					<description><![CDATA[<p>Imagine drones are forced to land. Rockets are deflected. Electrical grids, telecommunications, and transportation systems are degraded. Airliners are driven off course. Interference with Global Positioning System (GPS) signals is a fact of everyday life, and things are only getting worse. One example is instructive. The rate at which aircraft locations are electronically manipulated, “spoofed,” [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/how-diplomacy-can-save-gps/">How Diplomacy Can Save GPS</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Imagine drones are forced to land. Rockets are deflected. Electrical grids, telecommunications, and transportation systems are degraded. Airliners are driven off course. Interference with Global Positioning System (GPS) signals is a fact of everyday life, and things are only getting worse.</p>
<p>One example is instructive. The rate at which aircraft locations are electronically manipulated, “spoofed,” increased 500 percent in the first three quarters of 2024. An average of 1,500 flights a day were impacted by the beginning of September. In a <a href="https://ops.group/blog/gps-spoofing-final-report/">recent survey of almost 2,000 flight crew members</a>, 70 percent described their concerns about the impact on aviation safety as either “very high” or “extreme.”</p>
<p>The world depends upon signals from GPS and other global navigation satellite systems (GNSS) to underpin virtually every technology. Yet the essential positioning, navigation, and timing (PNT) service they provide is incredibly vulnerable.</p>
<p><strong>Weak and Vulnerable Signals</strong></p>
<p>These signals from space are, of necessity, very weak. The sun shining produces stronger radio signals than a GPS satellite. Yet, through a miracle of technology, receivers on earth can find coded signals in the radio noise floor, decipher them, and tell Americans where they are and the exact time.</p>
<p>Exceptionally weak signals mean that almost any interference on the right frequency can prevent them from getting through. For less than ten dollars, delivery drivers looking to electronically hide from their employers, people worried about being tracked by their spouse or the government, and bad actors wanting to disable receivers can buy a GPS “jammer” from any number of internet vendors. Such sales are illegal in most countries, as is the use of such devices. However, enforcement is almost always lax or nonexistent.</p>
<p>Keep in mind, signal specifications were made public as part of GPS becoming America’s “gift to the world,” with the US government encouraging GPS’s broad use. Other GNSS operators did the same.</p>
<p>While incredibly successful in promoting the wide adoption of signals, it has also facilitated spoofing. Compounding the problem, advances in digital technology brought inexpensive software-defined transmitters into the world. Now, for a few hundred dollars, a reasonably sophisticated hobbyist can easily imitate GPS and other satellite navigation signals.</p>
<p>The necessity of PNT services for everyday life and over-reliance on GPS/GNSS for PNT makes the vulnerability of signals to denial and imitation a primary weapon in conflicts around the globe.</p>
<p>This impacts millions of those not involved in these conflicts because any receiver within line-of-sight of the interfering transmitter can be affected. Thus, cell phone systems in Finland are degraded by drone defenses in St. Petersburg. First responders across the Middle East must use paper maps because of ongoing conflicts. Ships and aircraft, hundreds of miles from military actions, lose their navigation and collision avoidance systems. Given the number of conflicts around the planet, many regions of the world are adversely affected.</p>
<p>To date, appeals by international maritime and aviation professional organizations have failed to make an impact on the problem. The same is true for resolutions by the United Nation’s International Maritime Organization and International Civil Aviation Organization. The International Telecommunications Union (ITU), which seems to have the principal jurisdiction for this, is proving similarly ineffective.</p>
<p>At its World Radio Conference in December 2023, ITU delegates approved what, at first glance, appears to be a strong<a href="https://www.itu.int/dms_pub/itu-r/opb/act/R-ACT-WRC.16-2024-PDF-E.pdf"> resolution enjoining member states to refrain from interfering with GNSS</a> signals. The only way the resolution could pass was with an exception allowing interference “for security or defense purposes.” It is hard to imagine any other reason for which a state would disrupt signals.</p>
<p>Despite the failures of international diplomacy to mitigate this growing problem, there is likely a path for it to be much more successful. Attacks on GPS and other GNSS signals are useful only because most nations and systems over-depend on them with few alternatives.</p>
<p>Fortunately, many countries are actively considering establishing robust and resilient terrestrial PNT systems to complement signals from space. These can provide GPS-like information, but do not have common vulnerabilities and failure modes with GNSS.</p>
<p>The US Department of Transportation, the lead in America for civil PNT issues, said that intelligently using a combination of independent signals from space, terrestrial broadcast, and fiber cable can be the foundation of a resilient national PNT architecture.</p>
<p>Establishing such a system of systems will not make the services invulnerable. However, it will make them hard enough to disrupt so that antagonists will look elsewhere for opportunities to create mischief. Some nations are already taking significant steps toward achieving such resilience.</p>
<p>South Korea and Saudi Arabia field high-power terrestrial systems that provide PNT. The United Kingdom fields a partial system and seems poised to expand it, as well as a deployable capability. Much of Russia is also served by such a system.</p>
<p>China has the world’s most complete and advanced resilient PNT architecture. It includes three constellations of satellites in different orbital planes, an extensive terrestrial broadcast system, and a 20,000-kilometer fiber timing network with 295 “timing stations.”</p>
<p>Yet much of the world remains vulnerable to disruption. Those who interfere are therefore incentivized.</p>
<p>International diplomacy, in the form of the United Nations, can help improve the inevitable transition to resilient PNT by encouraging states to implement sovereign terrestrial systems. These systems will complement and cooperate with GNSS, while also operating independently.</p>
<p>As part of this effort, international standards can be developed to ensure aircraft, ships, and vehicles are able to seamlessly transit between nations. Technical assistance can be provided to nations with little local expertise in the field.</p>
<p>These efforts will greatly reduce the incentive to interfere with GNSS, thereby making it safer and more reliable. It will also reinforce the sovereignty and security of every involved nation.</p>
<p>The alternative is to continue down the path of increasing interference and increasing risk to life and property. Safety margins are already impacted. Ships are already colliding, and passenger aircraft are nearly straying, unannounced, into hostile airspace, all because of spoofing. It is only a matter of time before the world witnesses an avoidable tragedy.</p>
<p>The international community, perhaps in the form of a United Nations task force, must intervene to protect these fragile signals from space and disincentivize future disruptions.</p>
<p>Safer and more reliable signals from space and resilient sovereign terrestrial PNT are in the long-term interest of every nation. Diplomatic efforts must illuminate that shared interest bring parties together and nurture progress for everyone’s benefit.</p>
<p><em>Dana A. Goward is President of the Resilient Navigation and Timing Foundation, www.RNTFnd.org, an educational and scientific charity. He is a member of the president’s National Space-based Positioning, Navigation, and Timing Advisory Board and formerly served as the maritime navigation authority for the United States. Views expressed in this article are the author&#8217;s own. </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/12/How-Diplomacy-Can-Save-GPS.pdf"><img decoding="async" class="alignnone wp-image-28926 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/how-diplomacy-can-save-gps/">How Diplomacy Can Save GPS</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/how-diplomacy-can-save-gps/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
