Evil
Twin Strategy – designing a spoof WiFi hot spot with the intent of intercepting
sensitive data
http://www.math.dartmouth.edu/~doyle/docs/twin/twin/twin.html
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci1052455,00.html
http://www.cnn.com/2005/TECH/internet/01/20/evil.twins/index.html