There's a layer of your life that broadcasts continuously, in every direction, and asks nothing in return β no login, no password, no acknowledgment. It just transmits. Your phone tells towers where it is. Your car tells the parking lot who you are. Your office badge talks to readers you've never seen. Your smart home devices chatter with each other in a frequency band nobody's watching.
This layer is radio frequency. And it is, by design, a soft target.
"Soft target" is military language for something that is exposed, unguarded, and not expecting to be hit. The RF spectrum is soft in a very specific way: most of the signals flying through your environment were designed for convenience, not security. The people who built them optimized for range and reliability. Authentication was an afterthought. Encryption was optional. Interoperability was the goal. Verification was not.
That was fine when the receivers were expensive and the expertise was rare. Neither of those things is true anymore.
The Landscape, Briefly
Before getting into the attack surface, a rough map of what we're actually talking about.
Wi-Fi (2.4 GHz / 5 GHz / 6 GHz) β The one everyone knows. WPA2 is crackable offline if the passphrase is weak and you can capture the handshake. WPA3 is better but adoption is slow and mixed environments are common. Enterprise 802.1X is solid when configured correctly, which it often isn't.
Cellular (700 MHz β 2100 MHz and up) β Your phone's actual connection to the network. LTE is reasonably secure. 3G and 2G are not. The attack surface here is real and underappreciated: the phone picks the strongest signal it can find, and it does not verify that signal is legitimate before connecting.
Sub-GHz (300 MHz β 1 GHz) β This is where things get interesting. Garage doors, car fobs, alarm sensors, smart meters, weather stations, industrial sensors. Most of this band runs unencrypted. Some of it uses rolling codes, which are better but not perfect. A lot of it uses fixed codes, which are simply replayable.
RFID / NFC (125 kHz / 13.56 MHz) β Access cards, hotel keycards, transit passes, contactless payment, asset tags. 125 kHz (EM4100, HID Prox) is read-only and trivially cloneable. 13.56 MHz (MIFARE, DESFire) ranges from reasonably secure to embarrassingly weak depending on which card standard the building owner paid for.
Bluetooth / BLE (2.4 GHz) β Wireless keyboards, headphones, fitness trackers, IoT sensors, door locks, beacons. Pairing security varies wildly. BLE tracking is an entire discipline by itself.
IR (infrared) β TVs, projectors, HVAC controllers, some legacy access panels. No authentication whatsoever. Range-limited, but that's often the only protection.
Obvious Soft Targets
These show up in every security talk and still don't get fixed. Worth naming anyway because "obvious" doesn't mean "patched."
The Parking Garage Gate
Sub-GHz, fixed code, no rolling protection. You can capture the signal once with a Flipper or HackRF, replay it, and the gate opens. Every time. The cloned signal is indistinguishable from the real fob because they are, functionally, the same thing.
This is not hypothetical. It's routine.
The Office Badge
HID Prox badges β the thick, credit-card-sized ones in beige or white β operate at 125 kHz with the card ID broadcast in plaintext. The reader reads it. The system trusts it. There is no cryptographic handshake. A Proxmark or Flipper held near someone in an elevator, or in line at a coffee shop, reads the card without their knowledge. That ID can then be written to a blank and used freely.
A significant portion of corporate America still runs on this. Many buildings have upgraded readers but kept the same 125 kHz cards for "backward compatibility" β which is another way of saying they spent money and achieved nothing.
The WPA2 Handshake
Everyone knows this one. Walk around with a Pwnagotchi, capture four-way handshakes, crack offline with a wordlist. The window has narrowed β WPA3 SAE makes this genuinely harder β but the installed base of WPA2 networks is enormous and will remain so for years. In dense urban environments, a passive Pwnagotchi running for an afternoon captures dozens of handshakes. A meaningful percentage of them crack against common wordlists.
Bluetooth Keyboards and Mice
Unencrypted BLE HID keyboards are a known attack vector. MouseJack, the research that demonstrated wireless mouse injection attacks, is a decade old. The vulnerable hardware is still sold. MouseJack-style attacks inject keystrokes into systems from outside the room. This is the RF equivalent of someone typing on your computer while standing in the parking lot.
Less Obvious Soft Targets
The interesting ones. These don't get talked about at the same volume but the exposure is real.
Cell Towers You're Already Connected To
Your phone is constantly scanning for towers and connecting to the strongest signal. It has no way to verify that signal is real. An IMSI catcher β a Stingray, a DRT box, or a software-defined equivalent running on a laptop and a HackRF β impersonates a cell tower. Your phone connects. The catcher captures your IMSI identifier, which is persistent and unique. Depending on sophistication: location tracking, call interception, SMS interception, encryption downgrade to A5/1 or none.
This is not a theoretical threat. IMSI catchers have been documented at protests, courthouses, airports, political events, and border crossings in dozens of countries. The price of a capable passive unit has dropped substantially. The expertise required to operate one is available.
Your phone does not tell you when this happens. There is no indicator in iOS or Android that you are connected to a fake tower. The UX is identical to a real connection.
Smart Meters
Utility smart meters communicate over Sub-GHz RF and in some deployments, Zigbee or Z-Wave. They broadcast consumption data β and in some configurations, broadcast it in plaintext. The information isn't just energy data. Consumption patterns reveal occupancy, schedules, and behavior. When a house is empty. When people wake up. When an office is running at capacity.
Not an attack vector in the traditional sense. Passive surveillance infrastructure that exists in most buildings and is rarely considered.
Tire Pressure Monitors
TPMS sensors broadcast on 315 or 433 MHz with a unique sensor ID that is stable and tied to a specific vehicle. With a passive SDR receiver, you can log when a specific vehicle passes a fixed point, or track it across multiple points. This is how some law enforcement and investigative firms build location histories without GPS.
Again β passive collection of persistent identifiers that were never meant to be surveillance infrastructure.
Contactless Payment Skimming at Range
NFC nominal range is a few centimeters. Actual range with a directional antenna and a sensitive reader is longer β research has demonstrated reads at 40β80 cm under controlled conditions. Payment cards implement transaction limits and cryptographic verification that make actual fraud difficult. But card number, expiry, and cardholder name can still be read from some cards in plaintext. Whether that exposure matters depends on what you do with it.
The Building You're Sitting In
Commercial buildings increasingly run BACnet, Modbus, or KNX over RF for HVAC, lighting, elevator control, and access management. These protocols were designed for reliability on isolated networks. Many have minimal authentication. Some have none. They are now, in many buildings, reachable from within the building's guest Wi-Fi segment or via nearby RF.
HVAC manipulation is not glamorous. It is, however, a way to make a building unusable without touching a single computer, and it has been documented in real intrusions.
Honeypots: RF Edition
A honeypot in the traditional sense is a fake target that detects when someone's poking at it. RF honeypots are underused but genuinely useful.
Canary SSIDs. Create a Wi-Fi network with a name that looks like real infrastructure but isn't β CORP-WIFI-BACKUP, [buildingname]-GUEST. Set up logging on anything that probes or attempts to associate with it. A Pwnagotchi or Wi-Fi scanner in the area will probe remembered networks, which tells you someone with a scanning device was in range.
Fake RFID cards. Issue a set of RFID credentials that are valid in your access control system but belong to no real person. Log every time they're used. If a card that doesn't belong to anyone scans at a reader, someone cloned a card from somewhere near that reader. The which-reader tells you approximately where the clone happened.
Sub-GHz bait transmitters. A cheap Arduino or ESP32 broadcasting a recognizable Sub-GHz pattern on a frequency you monitor. If your SDR monitoring setup sees that pattern reflected or repeated from a direction it shouldn't be coming from, something nearby is capturing and replaying signals.
BLE beacons with known UUIDs. Deploy BLE beacons with logged UUIDs in sensitive areas. If a device you don't recognize starts advertising that UUID, or if a scanning sweep shows unexpected UUID collection behavior, you have a proximity indicator.
None of these are foolproof. They're tripwires. Tripwires are useful.
Detection and Alerting: What Actually Works
Monitoring the RF layer requires different tooling than network monitoring. There's no syslog to parse. You're looking at physical-layer signals.