{"689043":{"#nid":"689043","#data":{"type":"news","title":"When GPS Lies at Sea: How Electronic Warfare is Threatening Ships and Their\u00a0Crews","body":[{"value":"\u003Cdiv class=\u0022theconversation-article-body\u0022\u003E\u003Cp\u003EThe war in Iran has dominated headlines with reports of airstrikes and escalating military activity. But beyond the immediate devastation, the conflict has also illuminated a quieter and rapidly \u003Ca href=\u0022https:\/\/www.cnn.com\/2026\/03\/06\/science\/gps-jamming-ships-planes-iran-war\u0022\u003Egrowing danger\u003C\/a\u003E: the vulnerability of ships, and the people who operate them, to \u003Ca href=\u0022https:\/\/www.wired.com\/story\/gps-attacks-near-iran-are-wreaking-havoc-on-delivery-and-mapping-apps\/\u0022\u003Edisruption of their navigation systems\u003C\/a\u003E.\u003C\/p\u003E\u003Cp\u003EModern shipping depends heavily on GPS satellite navigation. When those signals are disrupted or manipulated, ships can suddenly appear to their navigators and to other ships to be \u003Ca href=\u0022https:\/\/www.scientificamerican.com\/article\/gps-spoofing-is-scrambling-ships-in-the-strait-of-hormuz\/\u0022\u003Esomewhere they are not\u003C\/a\u003E. In some cases, vessels have been shown jumping across maps, drifting miles inland or appearing to circle in impossible patterns. The risk is even higher in war zones, where ships could be misdirected into harm\u2019s way.\u003C\/p\u003E\u003Cp\u003EAs a \u003Ca href=\u0022https:\/\/scholar.google.com\/citations?user=tK7pFfsAAAAJ\u0026amp;hl=en\u0022\u003Ecybersecurity researcher\u003C\/a\u003E studying critical infrastructure and maritime systems, I investigate how digital threats affect ships and the people who operate them.\u003C\/p\u003E\u003Cp\u003ETo understand the threat from GPS disruptions, it helps to first understand \u003Ca href=\u0022https:\/\/electronics.howstuffworks.com\/gadgets\/travel\/gps.htm\u0022\u003Ehow GPS works\u003C\/a\u003E. GPS systems determine location using signals from satellites orbiting Earth. A receiver calculates its position by measuring how long those signals take to arrive. Because those signals are extremely weak by the time they reach Earth, they are relatively easy to disrupt.\u003C\/p\u003E\u003Ch2\u003EGPS Jamming and Spoofing\u003C\/h2\u003E\u003Cp\u003EIn GPS jamming, an attacker blocks the real satellite signals by overwhelming them with electromagnetic noise so receivers cannot detect them. When this happens, navigation systems lose their position. On a phone, it might look like the map freezing or jumping erratically.\u003C\/p\u003E\u003Cp\u003EGPS spoofing is more sophisticated. Instead of blocking signals, an attacker transmits fake satellite signals designed to mimic the real ones. The receiver accepts these signals and gives a false location. Imagine driving north while your navigation system suddenly insists you are traveling south. The receiver is not malfunctioning; it has simply been tricked.\u003C\/p\u003E\u003Cfigure class=\u0022align-center zoomable\u0022\u003E\u003Cp\u003E\u003Ca href=\u0022https:\/\/images.theconversation.com\/files\/723498\/original\/file-20260312-57-iw7xin.png?ixlib=rb-4.1.0\u0026amp;q=45\u0026amp;auto=format\u0026amp;w=1000\u0026amp;fit=clip\u0022\u003E\u003Cimg alt=\u0022a map showing numerous red dots and three red circles\u0022 src=\u0022https:\/\/images.theconversation.com\/files\/723498\/original\/file-20260312-57-iw7xin.png?ixlib=rb-4.1.0\u0026amp;q=45\u0026amp;auto=format\u0026amp;w=754\u0026amp;fit=clip\u0022 srcset=\u0022https:\/\/images.theconversation.com\/files\/723498\/original\/file-20260312-57-iw7xin.png?ixlib=rb-4.1.0\u0026amp;q=45\u0026amp;auto=format\u0026amp;w=600\u0026amp;h=352\u0026amp;fit=crop\u0026amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/723498\/original\/file-20260312-57-iw7xin.png?ixlib=rb-4.1.0\u0026amp;q=30\u0026amp;auto=format\u0026amp;w=600\u0026amp;h=352\u0026amp;fit=crop\u0026amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/723498\/original\/file-20260312-57-iw7xin.png?ixlib=rb-4.1.0\u0026amp;q=15\u0026amp;auto=format\u0026amp;w=600\u0026amp;h=352\u0026amp;fit=crop\u0026amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/723498\/original\/file-20260312-57-iw7xin.png?ixlib=rb-4.1.0\u0026amp;q=45\u0026amp;auto=format\u0026amp;w=754\u0026amp;h=442\u0026amp;fit=crop\u0026amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/723498\/original\/file-20260312-57-iw7xin.png?ixlib=rb-4.1.0\u0026amp;q=30\u0026amp;auto=format\u0026amp;w=754\u0026amp;h=442\u0026amp;fit=crop\u0026amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/723498\/original\/file-20260312-57-iw7xin.png?ixlib=rb-4.1.0\u0026amp;q=15\u0026amp;auto=format\u0026amp;w=754\u0026amp;h=442\u0026amp;fit=crop\u0026amp;dpr=3 2262w\u0022 sizes=\u0022(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\u0022\u003E\u003C\/a\u003E\u003C\/p\u003E\u003Cfigcaption\u003E\u003Cspan class=\u0022caption\u0022\u003ECircular loops in the Black Sea show spoofed ship positions recorded in January 2025. The red points represent false GPS locations broadcast during spoofing events, making vessels appear to move in perfect circles on tracking maps even though they were actually hundreds of miles away. These disruptions are widely believed to be linked to electronic interference in the region during the war in Ukraine. Image created with data from Spire Global.\u003C\/span\u003E \u003Ca class=\u0022source\u0022 href=\u0022https:\/\/spire.com\/\u0022\u003E\u003Cspan class=\u0022attribution\u0022\u003EAnna Raymaker\u003C\/span\u003E\u003C\/a\u003E\u003C\/figcaption\u003E\u003C\/figure\u003E\u003Cp\u003EFor mariners at sea, spoofing can have serious consequences. In the open ocean, there are few landmarks to verify a ship\u2019s position if GPS behaves strangely. Nearshore, the margin for error disappears: Water depths change quickly and hazards are everywhere, especially in narrow routes like the \u003Ca href=\u0022https:\/\/gcaptain.com\/electronic-fog-of-war-gps-spoofing-distorts-ship-traffic-near-hormuz\/\u0022\u003EStrait of Hormuz near Iran\u003C\/a\u003E, where reports indicate that GPS spoofing has been happening since the outbreak of the war. Because ships are large and slow to maneuver, even small navigation errors can lead to groundings or collisions.\u003C\/p\u003E\u003Ch2\u003ERed Sea Grounding\u003C\/h2\u003E\u003Cp\u003EOne example came in May 2025. While transiting the Red Sea, the container ship MSC Antonia began showing positions far from its true location. To navigators onboard, this looked like they had jumped hundreds of miles south on the map and started moving in a new direction. This caused the crew to become disoriented, and the ship eventually ran aground. \u003Ca href=\u0022https:\/\/www.lloydslist.com\/LL1154079\/MSC-ship-sails-through-Bab-el-Mandeb-for-first-time-since-Red-Sea-exodus\u0022\u003EThe grounding\u003C\/a\u003E caused millions of dollars in damage and required a salvage operation that lasted over five weeks.\u003C\/p\u003E\u003Cfigure class=\u0022align-center zoomable\u0022\u003E\u003Cp\u003E\u003Ca href=\u0022https:\/\/images.theconversation.com\/files\/723496\/original\/file-20260312-63-pvsmuu.png?ixlib=rb-4.1.0\u0026amp;q=45\u0026amp;auto=format\u0026amp;w=1000\u0026amp;fit=clip\u0022\u003E\u003Cimg alt=\u0022two copies of a map side-by-side showing a body of water\u0022 src=\u0022https:\/\/images.theconversation.com\/files\/723496\/original\/file-20260312-63-pvsmuu.png?ixlib=rb-4.1.0\u0026amp;q=45\u0026amp;auto=format\u0026amp;w=754\u0026amp;fit=clip\u0022 srcset=\u0022https:\/\/images.theconversation.com\/files\/723496\/original\/file-20260312-63-pvsmuu.png?ixlib=rb-4.1.0\u0026amp;q=45\u0026amp;auto=format\u0026amp;w=600\u0026amp;h=280\u0026amp;fit=crop\u0026amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/723496\/original\/file-20260312-63-pvsmuu.png?ixlib=rb-4.1.0\u0026amp;q=30\u0026amp;auto=format\u0026amp;w=600\u0026amp;h=280\u0026amp;fit=crop\u0026amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/723496\/original\/file-20260312-63-pvsmuu.png?ixlib=rb-4.1.0\u0026amp;q=15\u0026amp;auto=format\u0026amp;w=600\u0026amp;h=280\u0026amp;fit=crop\u0026amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/723496\/original\/file-20260312-63-pvsmuu.png?ixlib=rb-4.1.0\u0026amp;q=45\u0026amp;auto=format\u0026amp;w=754\u0026amp;h=352\u0026amp;fit=crop\u0026amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/723496\/original\/file-20260312-63-pvsmuu.png?ixlib=rb-4.1.0\u0026amp;q=30\u0026amp;auto=format\u0026amp;w=754\u0026amp;h=352\u0026amp;fit=crop\u0026amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/723496\/original\/file-20260312-63-pvsmuu.png?ixlib=rb-4.1.0\u0026amp;q=15\u0026amp;auto=format\u0026amp;w=754\u0026amp;h=352\u0026amp;fit=crop\u0026amp;dpr=3 2262w\u0022 sizes=\u0022(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\u0022\u003E\u003C\/a\u003E\u003C\/p\u003E\u003Cfigcaption\u003E\u003Cspan class=\u0022caption\u0022\u003EMSC Antonia route comparison showing the vessel\u2019s true route and grounding point, left, versus the spoofed route, right. The red and black lines on the right show the spoofed locations where the ship appeared to suddenly jump to on GPS. These lines confused the navigators and caused them to run aground. Images created with data from VT Explorer.\u003C\/span\u003E \u003Ca class=\u0022source\u0022 href=\u0022https:\/\/www.vtexplorer.com\/\u0022\u003E\u003Cspan class=\u0022attribution\u0022\u003EAnna Raymaker\u003C\/span\u003E\u003C\/a\u003E\u003C\/figcaption\u003E\u003C\/figure\u003E\u003Cp\u003EIncidents like the MSC Antonia are not isolated. Vessel-tracking data has revealed clusters of ships suddenly appearing in impossible locations, sometimes far inland or moving in perfect circles. These anomalies are increasingly linked to GPS spoofing in regions experiencing geopolitical conflict.\u003C\/p\u003E\u003Cp\u003EBut GPS interference is only one type of cyber threat facing ships. Industry reports have documented \u003Ca href=\u0022https:\/\/www.lrqa.com\/en\/insights\/articles\/notpetya-ransomware-attack-on-maersk-key-learnings\/\u0022\u003Eransomware attacks\u003C\/a\u003E on shipping companies, \u003Ca href=\u0022https:\/\/industrialcyber.co\/supply-chain-security\/lab-dookhtegan-cyberattack-on-iranian-oil-tankers-traced-to-supply-chain-compromise-of-fanavas-infrastructure\/\u0022\u003Esupply chain compromises\u003C\/a\u003E and increasing concern about the security of onboard control systems, including engines, propulsion and navigation equipment. As ships become more connected through satellite internet systems and remote monitoring tools, the number of potential entry points for \u003Ca href=\u0022https:\/\/industrialcyber.co\/reports\/maritime-cyber-incidents-jump-103-as-cytur-warns-smart-ships-under-fire-urges-secure-by-design-overhaul\/\u0022\u003Ecyberattacks\u003C\/a\u003E is growing.\u003C\/p\u003E\u003Cp\u003EMilitary vessels often address these risks through \u003Ca href=\u0022https:\/\/www.usni.org\/magazines\/proceedings\/2024\/august\/address-risks-starlink-fleet\u0022\u003Estricter network segregation\u003C\/a\u003E and regular training exercises such as \u201cmission control\u201d drills, which simulate operating with compromised communications or navigation systems. Some cybersecurity experts argue that similar practices could help commercial shipping improve its resilience, although smaller crews and limited resources make adopting military-style procedures more difficult.\u003C\/p\u003E\u003Ch2\u003EMariners\u2019 Experiences\u003C\/h2\u003E\u003Cp\u003EMuch of the public discussion around maritime cybersecurity focuses on technical vulnerabilities in ship systems. But an equally important piece of the puzzle is the people who must interpret and respond to these technologies when something goes wrong.\u003C\/p\u003E\u003Cp\u003EIn recent research, my colleagues and I interviewed professional mariners about their experiences with cyber incidents and their preparedness to respond to them. The interviews included navigation officers, engineers and other crew members responsible for ship systems. What emerged was a consistent picture: Cyber threats are increasingly occurring at sea, but crews are \u003Ca href=\u0022https:\/\/doi.org\/10.1145\/3719027.3744816\u0022\u003Enot well prepared\u003C\/a\u003E to deal with them.\u003C\/p\u003E\u003Cp\u003EMany mariners told us that their cybersecurity training focused almost entirely on email phishing and USB drives. That kind of training may make sense in an office, but it does little to prepare crews for cyber incidents on a ship, where navigation and control systems can be the primary targets. As a result, many mariners lack clear guidance on how cyberattacks might affect the equipment they rely on every day.\u003C\/p\u003E\u003Cfigure class=\u0022align-center zoomable\u0022\u003E\u003Cp\u003E\u003Ca href=\u0022https:\/\/images.theconversation.com\/files\/723678\/original\/file-20260312-57-scxx0h.jpg?ixlib=rb-4.1.0\u0026amp;q=45\u0026amp;auto=format\u0026amp;w=1000\u0026amp;fit=clip\u0022\u003E\u003Cimg alt=\u0022a man inside the bridge of a large ship at sea looks through binoculars with another ship in the background\u0022 src=\u0022https:\/\/images.theconversation.com\/files\/723678\/original\/file-20260312-57-scxx0h.jpg?ixlib=rb-4.1.0\u0026amp;q=45\u0026amp;auto=format\u0026amp;w=754\u0026amp;fit=clip\u0022 srcset=\u0022https:\/\/images.theconversation.com\/files\/723678\/original\/file-20260312-57-scxx0h.jpg?ixlib=rb-4.1.0\u0026amp;q=45\u0026amp;auto=format\u0026amp;w=600\u0026amp;h=384\u0026amp;fit=crop\u0026amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/723678\/original\/file-20260312-57-scxx0h.jpg?ixlib=rb-4.1.0\u0026amp;q=30\u0026amp;auto=format\u0026amp;w=600\u0026amp;h=384\u0026amp;fit=crop\u0026amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/723678\/original\/file-20260312-57-scxx0h.jpg?ixlib=rb-4.1.0\u0026amp;q=15\u0026amp;auto=format\u0026amp;w=600\u0026amp;h=384\u0026amp;fit=crop\u0026amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/723678\/original\/file-20260312-57-scxx0h.jpg?ixlib=rb-4.1.0\u0026amp;q=45\u0026amp;auto=format\u0026amp;w=754\u0026amp;h=483\u0026amp;fit=crop\u0026amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/723678\/original\/file-20260312-57-scxx0h.jpg?ixlib=rb-4.1.0\u0026amp;q=30\u0026amp;auto=format\u0026amp;w=754\u0026amp;h=483\u0026amp;fit=crop\u0026amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/723678\/original\/file-20260312-57-scxx0h.jpg?ixlib=rb-4.1.0\u0026amp;q=15\u0026amp;auto=format\u0026amp;w=754\u0026amp;h=483\u0026amp;fit=crop\u0026amp;dpr=3 2262w\u0022 sizes=\u0022(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\u0022\u003E\u003C\/a\u003E\u003C\/p\u003E\u003Cfigcaption\u003E\u003Cspan class=\u0022caption\u0022\u003ECommercial shipping crews are generally poorly trained to deal with cyber threats.\u003C\/span\u003E \u003Ca class=\u0022source\u0022 href=\u0022https:\/\/www.gettyimages.com\/detail\/photo\/navigation-bridge-of-oil-tanker-with-watch-officer-royalty-free-image\/520707142\u0022\u003E\u003Cspan class=\u0022attribution\u0022\u003EMenzhiliyAnantoly\/iStock via Getty Images\u003C\/span\u003E\u003C\/a\u003E\u003C\/figcaption\u003E\u003C\/figure\u003E\u003Cp\u003EThis becomes a problem when ship systems begin behaving strangely. Mariners described GPS showing incorrect positions or temporarily losing signal. It can be difficult to tell whether these incidents are equipment failures or signs of cyber interference.\u003C\/p\u003E\u003Cp\u003EEven when mariners suspect something may be wrong, many ships lack clear procedures for responding to cyber incidents. Participants frequently described situations where they would have to improvise if navigation or other digital systems behaved unexpectedly. Unlike equipment failures, which have established checklists and procedures, cyber incidents often fall into a gray area where responsibility and response plans are unclear.\u003C\/p\u003E\u003Cp\u003EAnother challenge is the gradual disappearance of traditional navigation practices. For centuries, mariners relied on paper charts and celestial navigation to determine their position. Today, most commercial vessels rely almost entirely on electronic systems.\u003C\/p\u003E\u003Cp\u003EMany mariners noted that paper charts are not available onboard, and celestial navigation is rarely practiced. If GPS or electronic navigation systems fail, crews have limited ways to independently verify their position. One mariner bluntly described the risk to us: \u201cIf you don\u2019t have charts and you\u2019re being spoofed, you\u2019re a little screwed.\u201d\u003C\/p\u003E\u003Cfigure\u003E\u003Cp\u003E\u003Ciframe width=\u0022440\u0022 height=\u0022260\u0022 src=\u0022https:\/\/www.youtube.com\/embed\/SKTdOhUUKDA?wmode=transparent\u0026amp;start=0\u0022 frameborder=\u00220\u0022 allowfullscreen=\u0022\u0022\u003E\u003C\/iframe\u003E\u003C\/p\u003E\u003Cfigcaption\u003E\u003Cspan class=\u0022caption\u0022\u003EA crew member explains the instruments on the bridge of an oil tanker.\u003C\/span\u003E\u003C\/figcaption\u003E\u003C\/figure\u003E\u003Ch2\u003EIncreasing Connectivity, Increasing Risk\u003C\/h2\u003E\u003Cp\u003EAt the same time, ships are becoming more connected. Modern vessels increasingly rely on satellite internet systems like Starlink and remote monitoring tools to manage operations and communicate with shore.\u003C\/p\u003E\u003Cp\u003EWhile these technologies improve efficiency, they also \u003Ca href=\u0022https:\/\/www.navytimes.com\/news\/your-navy\/2024\/09\/03\/how-navy-chiefs-conspired-to-get-themselves-illegal-warship-wi-fi\/\u0022\u003Eexpand the vulnerability of ship systems\u003C\/a\u003E. Connectivity that allows crews to send emails or access the internet can also provide pathways for cyber threats to reach onboard systems.\u003C\/p\u003E\u003Cp\u003EAs GPS spoofing becomes more common in regions experiencing geopolitical conflict, the challenges mariners described in our research are becoming harder to ignore. The oceans may seem vast and empty, but the digital signals that guide modern ships travel through crowded and contested space.\u003C\/p\u003E\u003Cp\u003EWhen those signals are manipulated, the consequences do not stay confined to military systems. They reach the commercial vessels that carry most of the world\u2019s goods and the crews responsible for navigating them safely.\u003C!-- Below is The Conversation\u0027s page counter tag. Please DO NOT REMOVE. --\u003E\u003Cimg style=\u0022border-color:!important;border-style:none;box-shadow:none !important;margin:0 !important;max-height:1px !important;max-width:1px !important;min-height:1px !important;min-width:1px !important;opacity:0 !important;outline:none !important;padding:0 !important;\u0022 src=\u0022https:\/\/counter.theconversation.com\/content\/278181\/count.gif?distributor=republish-lightbox-basic\u0022 alt=\u0022The Conversation\u0022 width=\u00221\u0022 height=\u00221\u0022 referrerpolicy=\u0022no-referrer-when-downgrade\u0022\u003E\u003C!-- End of code. If you don\u0027t see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https:\/\/theconversation.com\/republishing-guidelines --\u003E\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003EThis article is republished from \u003C\/em\u003E\u003Ca href=\u0022https:\/\/theconversation.com\u0022\u003E\u003Cem\u003EThe Conversation\u003C\/em\u003E\u003C\/a\u003E\u003Cem\u003E under a Creative Commons license. Read the \u003C\/em\u003E\u003Ca href=\u0022https:\/\/theconversation.com\/when-gps-lies-at-sea-how-electronic-warfare-is-threatening-ships-and-their-crews-278181\u0022\u003E\u003Cem\u003Eoriginal article\u003C\/em\u003E\u003C\/a\u003E\u003Cem\u003E.\u003C\/em\u003E\u003C\/p\u003E\u003C\/div\u003E","summary":"","format":"full_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe war in Iran has dominated headlines with reports of airstrikes and escalating military activity. But beyond the immediate devastation, the conflict has also illuminated a quieter and rapidly growing danger: the vulnerability of ships, and the people who operate them, to disruption of their navigation systems.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"The war in Iran has dominated headlines with reports of airstrikes and escalating military activity. But beyond the immediate devastation, the conflict has also illuminated a quieter and rapidly growing danger."}],"uid":"27469","created_gmt":"2026-03-12 12:50:22","changed_gmt":"2026-03-19 15:28:16","author":"Kristen Bailey","boilerplate_text":"","field_publication":"","field_article_url":"","location":"Atlanta, GA","dateline":{"date":"2026-03-12T00:00:00-04:00","iso_date":"2026-03-12T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"679688":{"id":"679688","type":"image","title":"Cyberattacks like GPS spoofing threaten oil supertankers and cargo ships at sea. Ping Shu\/Moment via Getty Images","body":"\u003Cp\u003ECyberattacks like GPS spoofing threaten oil supertankers and cargo ships at sea. \u003Ca href=\u0022https:\/\/www.gettyimages.com\/detail\/photo\/deck-of-supertanker-royalty-free-image\/1445476540\u0022\u003EPing Shu\/Moment via Getty Images\u003C\/a\u003E\u003C\/p\u003E","created":"1773933826","gmt_created":"2026-03-19 15:23:46","changed":"1773933826","gmt_changed":"2026-03-19 15:23:46","alt":"Cyberattacks like GPS spoofing threaten oil supertankers and cargo ships at sea. Ping Shu\/Moment via Getty Images","file":{"fid":"263879","name":"file-20260312-69-xu1md2.jpg","image_path":"\/sites\/default\/files\/2026\/03\/19\/file-20260312-69-xu1md2_0.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2026\/03\/19\/file-20260312-69-xu1md2_0.jpg","mime":"image\/jpeg","size":162557,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2026\/03\/19\/file-20260312-69-xu1md2_0.jpg?itok=dj8-Nb4J"}}},"media_ids":["679688"],"related_links":[{"url":"https:\/\/theconversation.com\/when-gps-lies-at-sea-how-electronic-warfare-is-threatening-ships-and-their-crews-278181","title":"Read This Article on The Conversation"}],"groups":[{"id":"1237","name":"College of Engineering"},{"id":"658168","name":"Experts"},{"id":"1214","name":"News Room"},{"id":"1188","name":"Research Horizons"},{"id":"1255","name":"School of Electrical and Computer Engineering"}],"categories":[],"keywords":[{"id":"187915","name":"go-researchnews"}],"core_research_areas":[],"news_room_topics":[{"id":"71881","name":"Science and Technology"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Ch5\u003EAuthor:\u003C\/h5\u003E\u003Cp\u003E\u003Ca href=\u0022https:\/\/theconversation.com\/profiles\/anna-raymaker-2620037\u0022\u003EAnna Raymaker\u003C\/a\u003E, Ph.D. Candidate in Electrical and Computer Engineering, \u003Ca href=\u0022https:\/\/theconversation.com\/institutions\/georgia-institute-of-technology-1310\u0022\u003EGeorgia Institute of Technology\u003C\/a\u003E\u003C\/p\u003E\u003Ch5\u003EMedia Contact:\u003C\/h5\u003E\u003Cp\u003EShelley Wunder-Smith\u003Cbr\u003E\u003Ca href=\u0022mailto:shelley.wunder-smith@research.gatech.edu\u0022\u003E\u003Cstrong\u003Eshelley.wunder-smith@research.gatech.edu\u003C\/strong\u003E\u003C\/a\u003E\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}