How to recognize and mitigate GNSS jamming and spoofing threats