Some of the networks required more sophisticated hacking. I’d briefly jam a network, causing its legitimate users to be booted off-line; in their attempt to reconnect, they’d automatically rebroadcast their “authentication packets,” which I could intercept and effectively decipher into passwords that would let me log on just like any other “authorized” user.