You talked about taking control or spoofing. I would rather talk about jamming because it is easier to jam than to take control.
In practice, does that mean that there are two types of situations? Let us take the case of a power that has the same technology and interference capabilities, and the case of a terrorist organization that does not have the interference capabilities; would those be two types of intervention?