| http://www.w3.org/ns/prov#value | - The techniques may be used to suppress legitimate wireless beacons in an operational area, to establish a baiting beacon in the operational area, or to interfere with communications between a wireless device and a baiting beacon or other beacon.
|