Methods, apparatuses and systems directed to securing a wireless network
environment from eavesdropping and other unauthorized activities. One
implementation prevents or disrupts meaningful access to information
contained in WLAN RF signals that escape from a given physical space
during operation of the wireless network. One implementation utilizes
overlay RF signals transmitted on one or more operating channels of the
WLAN to overpower or mask the internal RF signals escaping from a defined
security line or perimeter. One implementation monitors the RF energy
escaping to dynamically adjust the power of the overlay signal as
required. Implementations of the invention can secure the outer perimeter
of an office within a building, or even the outer perimeter of an entire
building.