An attacker can modify transmitted data, jamming or overpowering the original signal and retransmitting a modified copy to the receiver, to command a spacecraft or to lead the system's owner to erroneous decision. [1] [2] [3]
Standard/references: [4]
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.