Our Eye Is on the SPARROW

How unauthorized users can exploit wireless infrastructures for covert communication.
Source: htdarkreading.com