The final issue with using a wireless surveillance camera on an open network is that the transmissions can be hijacked. As we previously illustrated, it is trivial to knock a wireless device off the air. Now imagine what would happen if we installed a web server on our laptop, then replicated the web-based interface of the camera, and included a few fake images to make the users think they were actually looking at a valid stream. Then we knock the real camera off the air via a targeted clear channel assessment attack and take the place of that device on the network by setting the IP and MAC address to the same as the camera.
The answer is illustrated in Figure 5. Can you tell it is a fake?
Figure 5 Spoofed camera page.