Methods, apparatus and program products which monitor wireless access
points (12, 16) through which data can be exchanged with a network (10),
identify an unauthorized access point (16), and respond to monitored data
flow in a variety of manners including determining the location of the
identified unauthorized access point, establishing filtering, and
controlling accounting for access services.