- Joined
- Sep 28, 2011
- Messages
- 14,139
- Likes
- 8,594
C4I.org - 10 GPS Vulnerabilities by Lieutenant Colonel Thomas K. Adams, US Army, Ret.
Dual Use and Vulnerabilities
Obviously the military uses GPS, but what are the vulnerabilities especially if the the system is attacked by a hostile entity?
I don't even know how many GPS systems there are and who controls them.
Dual Use and Vulnerabilities
I take GPS for granted now for land travel and marine navigation. (Well, my Garmin nüvi needs to go back to the factory, but that's another story.)Before entering the 21st century dependent on space-based systems and commercially developed information-technology based systems, the US military must understand its capabilities, limitations and vulnerabilities. Dual-use and off-the-shelf technologies offer real advantages and are especially cost effective. However, they have serious disadvantages:
Dual use means that both civilian and military users employ the same technology. Technology training, documentation and product improvements are also available to potential adversaries.
Off-the-shelf merchandise provides civilian and military users with nearly identical systems. Systems designed to operate in a much less stringent peacetime environment could be chosen rather than those designed for combat.
States, political movements and individuals can obtain current military technology without costly research, development, manufacture, training capacity or espionage.
Dual-use and off-the-shelf policies can give various entities much of the military capacity formerly reserved to the great powers.
Obviously the military uses GPS, but what are the vulnerabilities especially if the the system is attacked by a hostile entity?
I don't even know how many GPS systems there are and who controls them.