<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Law - Tag - Maritimeinfosec.org</title><link>https://maritimeinfosec.org/tags/law/</link><description>Law - Tag - Maritimeinfosec.org</description><generator>Hugo -- gohugo.io</generator><language>en-US</language><copyright>Copyright Maritimeinfosec.org 2018-2026</copyright><lastBuildDate>Sat, 21 Mar 2026 14:30:00 +0000</lastBuildDate><atom:link href="https://maritimeinfosec.org/tags/law/" rel="self" type="application/rss+xml"/><item><title>When Marine Technology, Ocean Development and the Law of the Sea addresses maritime cybersecurity, GNSS risks and autonomous vessels</title><link>https://maritimeinfosec.org/marine-technology-law-sea-cyber-gnss/</link><pubDate>Sat, 21 Mar 2026 14:30:00 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/marine-technology-law-sea-cyber-gnss/</guid><description><![CDATA[<p>The collective volume <em>Marine Technology, Ocean Development and the Law of the Sea</em> (2026), <a href="https://www.cambridge.org/core/services/aop-cambridge-core/content/view/80E6678C4CFC6A52B73D5786C703CF43/9781009760188AR.pdf/Marine_Technology__Ocean_Development_and_the_Law_of_the_Sea.pdf" target="_blank" rel="noopener noreferrer ">available as open access</a>, devotes significant attention to digital issues, with numerous occurrences of the term “cyber” and several chapters more broadly dedicated to the security of maritime systems.</p>
<h2 id="gnss-jamming-and-spoofing-a-clearly-documented-risk">GNSS, jamming and spoofing: a clearly documented risk</h2>
<p>The chapter on maritime cybersecurity provides a detailed description of the threats affecting GNSS systems. It recalls that associated attacks (spoofing, jamming) can lead to a loss of reliable positioning and to navigation errors, directly impacting maritime safety. It also emphasizes that users must “plan” (or at least anticipate!) “potential GPS disruptions, authenticate the reliability of received data and consider alternative positioning sources” (cyber chapter, pp. 278–280).</p>]]></description></item></channel></rss>