Systems designed to interfere with or disrupt communication, navigation, or surveillance systems. Examples include jamming and spoofing technology.
Systems designed to interfere with or disrupt communication, navigation, or surveillance systems. Examples include jamming and spoofing technology.