Our Eye Is on the SPARROW How unauthorized users can exploit wireless infrastructures for covert communication. Source: htdarkreading.com