Identify and analyze wireless network threats.
Examples: evil twin, bluesnarfing, jamming, disassociation