How unauthorized users can exploit wireless infrastructures for covert communication.