Image for Flippers's Electromagnetic Grimoire: Wireless Reconnaissance and Documentation Part 2: Safety, Law, and Responsible RF Testing
Technology May 17, 2026 • 16 min read

Flippers's Electromagnetic Grimoire: Wireless Reconnaissance and Documentation Part 2: Safety, Law, and Responsible RF Testing

Before touching any RF tool, understand the legal and ethical lines. Part 2 covers passive vs. active testing, hard rules, and documentation discipline.

Share:
Lee Foropoulos

Lee Foropoulos

16 min read

Continue where you left off?
Text size:

Contents

Part 1 of this series introduced the Flipper Zero as something more than a novelty gadget. It's a disciplined RF instrument, and learning to use it well means learning to think like someone who takes wireless infrastructure seriously. If you worked through that first installment, you came away with a clear picture of what the device actually does, what frequencies it operates across, and why the electromagnetic spectrum is a more crowded and consequential place than most people realize.

This part is different. No hardware. No captures. No walkthroughs of any kind.

Before any tool gets picked up in this series, the legal and ethical foundation has to be poured and allowed to set. That's not a formality. It's load-bearing material. Every technique in every subsequent part rests on what gets established here, and if you skip this section, you're building on nothing.

Why This Part Comes Before Everything Else

Golden wheat field at sunset representing the calm before understanding consequences
The RF spectrum looks quiet from the outside. Legally and technically, it is anything but.

Curiosity is cheap. A Flipper Zero costs around $170. An SDR dongle costs less than $30. The barrier to entry for RF experimentation is genuinely low, and that's part of what makes the technology exciting. But the consequence asymmetry between "trying something" and "getting caught trying something illegal" is severe enough that it deserves its own section before anything else gets discussed.

Federal prosecution is expensive in every sense. Legal fees for a CFAA or FCC enforcement case can run into six figures before a verdict is reached. Fines can compound daily. And the reputational damage in professional security communities, where people talk and records follow you, is its own category of cost.

"The gap between 'I was just curious' and 'I am now a federal defendant' is smaller than most people think, and it closes faster than you'd expect."

This isn't meant to frighten anyone away from RF research. It's meant to make sure that everyone who continues through this series does so with their eyes fully open. The tools covered here are real. The legal exposure from misusing them is equally real.

Series Disclaimer and Scope

This series exists for four specific purposes: ethical testing on systems you own or have explicit written authorization to test; defensive research aimed at understanding how wireless systems can be observed or probed so you can better protect them; developing a working understanding of your own equipment and how it behaves in the RF environment; and documenting abnormal RF activity in your environment without transmitting, interfering, or interacting with systems you don't control.

Series Scope. Read This Once and Remember It Always

This series does not authorize, encourage, or condone unauthorized access to any wireless system. It does not authorize unauthorized transmission on any frequency. It does not authorize jamming of any signal under any circumstance. It does not authorize replay attacks on any device or system you do not own with documented written permission. If you use the knowledge in this series to do any of those things, that is entirely your decision and entirely your legal exposure. This series is not your cover.

This part is not optional reading. It governs every subsequent part. Return to it if you're ever unsure whether something you're about to do is within scope.

How RF Law Actually Works: The Regulatory Landscape

Most people who pick up an RF tool for the first time think about what they can receive. The law thinks about something broader: what you transmit, what you intercept, what you store, and what systems you touch along the way. Understanding the regulatory landscape isn't about memorizing statutes. It's about knowing which category your activity falls into before you start.

FCC, ECPA, CFAA, and Why They All Apply

FCC Part 15 governs unlicensed RF devices operating in the United States. It sets the rules for what low-power devices can transmit without a license, covering everything from garage door openers to Wi-Fi routers to the Flipper Zero itself. The FCC regulates what you transmit, not just what you receive. That distinction matters enormously. Passive listening to a publicly broadcast signal sits in a very different legal category than keying up a transmitter on a frequency you don't hold a license for.

$10,000
Maximum FCC fine per violation per day for unlicensed transmission

The Electronic Communications Privacy Act (ECPA) governs the interception of electronic communications. The critical word there is "interception," and it applies even in passive contexts when the communication being received is not publicly broadcast or intended for general reception. Listening to ADS-B aircraft transponders is fine. Capturing private Bluetooth communications between someone's phone and their medical device is not, even if you never transmit a single bit in response.

The Computer Fraud and Abuse Act (CFAA) extends further than most people expect. It covers unauthorized access to protected computers and systems, and "access" has been interpreted broadly enough to include RF-based interactions. A replay attack that causes a system to respond as if it received a legitimate signal can constitute unauthorized access under the CFAA, even if the attacker never touched a keyboard.

Ignorance Is Not a Defense

In every jurisdiction covered in this series, and in most jurisdictions globally, not knowing that a law applied to your activity is not a legal defense. "I didn't know I needed a license" does not reduce an FCC fine. "I didn't know the CFAA covered RF replay" does not dismiss a federal charge. Know the law before you act, not after.

Jurisdiction Matters: US vs. EU vs. Global Considerations

Outside the United States, the regulatory picture shifts but doesn't simplify. The EU Radio Equipment Directive governs RF devices sold and operated in European markets, with compliance requirements that differ from FCC Part 15 in meaningful ways. GDPR adds another layer: if you capture RF data that contains personally identifiable information, including MAC addresses, device identifiers, or location data derived from signal triangulation, you may be operating under data protection obligations that carry their own enforcement regime and their own fines.

Close-up of a circuit board representing the intersection of technology and regulation
Every signal has a legal context attached to it. The hardware doesn't tell you what that context is.

Global RF law is not harmonized. Frequencies that are unlicensed in the US may be licensed or restricted in the EU, Canada, Japan, or Australia. If you travel with RF equipment and use it, you are subject to the laws of the country you're in, not the country where you bought the device. That's not a technicality. It's a real and frequently overlooked exposure.

Not all RF activity carries the same legal weight. Understanding the distinctions between categories is one of the most practically useful things this series can offer, because the line between legal and illegal often runs through the middle of what looks like a single continuous activity.

Abstract light trails representing signal transmission and movement through space
A signal in motion looks the same whether it's legal or not. The law doesn't care how it looks.

Passive Observation

Passive observation means listening only. No transmission. No decoding of encrypted private communications. No storage of personally identifiable data. You're receiving signals that are publicly broadcast and not interacting with them in any way that modifies, replays, or interferes with the originating system. This is the safest category and the one most of this series operates within.

Authorized Testing

Authorized testing means you have explicit, written permission from the owner of the system being tested. That permission is scoped to specific frequencies, specific devices, and a defined time window. It is documented before the test begins. Authorized testing is the only legal framework under which you can interact with systems you don't own.

Unauthorized Access

Unauthorized access covers any interaction with a system without documented owner consent. "Interaction" is broader than most people assume. Sending a signal that causes a device to respond, even if you never receive that response, can constitute access. This category carries CFAA exposure.

Transmission

Transmission means any emission of RF energy. Low power, unintentional, brief: none of those qualifiers remove the legal requirement. Every transmission either requires a license for the frequency being used or must comply with FCC Part 15 rules for unlicensed devices. There is no third option.

47 U.S.C. ยง 333
Federal statute prohibiting jamming. Criminal penalties including imprisonment apply

Replay

Replay means retransmitting a captured signal. Even once. Even at the original power level. Even if the signal itself was publicly observable when captured. Replaying a signal at a system you don't own is almost always a federal offense, because replay is a form of transmission directed at a specific system, which makes it both an unlicensed transmission and potentially an unauthorized access event simultaneously.

Jamming

Jamming is deliberate interference with radio communications. It is a federal felony in the United States under 47 U.S.C. ยง 333, regardless of intent, regardless of target, and regardless of whether the jammed system was doing anything important. There is no legal jamming scenario available to a private individual without specific federal authorization. None.

Jamming your neighbor's Wi-Fi because it bleeds into your apartment is still a federal felony. The law does not grade on intent.

Interference

Interference is unintentional disruption of other signals. It carries less criminal exposure than jamming, but it still carries liability, particularly near aviation frequencies, medical devices, and emergency communications infrastructure. "I didn't mean to" is a mitigating factor in some enforcement contexts, but it doesn't eliminate liability.

Hard Rules: The Lines You Do Not Cross

The Four Hard Rules. Memorize These

Rule 1: Never transmit on unknown frequencies. You cannot know what licensed service you may be disrupting, and disruption carries legal consequences regardless of intent.

Rule 2: Never replay captured signals from systems you do not own. Garage doors, key fobs, alarm fobs, gate controllers, any device. One replay is enough to constitute a federal offense.

Rule 3: Never test alarms, gates, appliances, keyboards, locks, or IoT devices without written permission from the owner. Verbal permission is not permission in any legal context that matters.

Rule 4: Never jam anything, ever, under any circumstance. Not as a test. Not as a demonstration. Not in your own home if the signal reaches a neighbor's property.

Never Transmit on Unknown Frequencies

The RF spectrum is not empty space waiting to be used. Every frequency range has assigned users, licensed services, and regulatory history. When you key up a transmitter on a frequency you haven't researched, you're not experimenting in a vacuum. You may be stepping on a licensed amateur radio operator, a weather balloon telemetry link, a paging service, a medical telemetry device, or an aviation navigation system. You won't know which one until something goes wrong.

Owning a device that can transmit on a given frequency does not give you the right to transmit there. The Flipper Zero can technically emit on frequencies where it has zero legal authorization to do so. The hardware capability and the legal permission are completely separate things.

Never Replay Signals From Systems You Do Not Own

This one trips people up because the intuition seems reasonable. The signal was already out there. You just captured it. Replaying it feels like a passive act.

It isn't. Replay is transmission directed at a specific system for the purpose of causing that system to respond. That's the definition of unauthorized access under the CFAA and unlicensed transmission under FCC rules, packaged together in a single button press.

"It's just one replay" is the same logic as "it's just one unauthorized login." The law measures the act, not your assessment of its significance.

Never Test Without Explicit Permission

The permission standard in RF testing is written authorization, scoped to specific systems, frequencies, and time windows. Verbal permission from a friend, a landlord, or a colleague does not meet that standard. Neither does implied permission based on your relationship to the person or your access to the physical location.

Written authorization protects you. It also protects the person who gave permission. Without it, you're exposed, and so are they. The inconvenience of getting something in writing is trivial compared to the exposure of operating without it.

The Passive Observation Safe Harbor

There is a category of RF activity that is broadly legal, widely practiced, and genuinely useful for understanding the electromagnetic environment around you. Passive observation of publicly broadcast, unencrypted signals is that category. It's where most of this series lives, and it's worth understanding precisely why it occupies a different legal space than the activities described above.

What You Can Legally Observe

ADS-B transponders broadcast aircraft position, altitude, speed, and identification data on 1090 MHz. That data is publicly transmitted, intended for general reception, and forms the basis for commercial flight tracking services like FlightAware.

1090 MHz
ADS-B broadcast frequency. Publicly observable, legally receivable without license or authorization

AIS transponders on ships broadcast vessel identification and position data on VHF maritime frequencies. Weather station sensors broadcast temperature, humidity, and pressure readings on ISM band frequencies. Unencrypted LoRa packets from agricultural sensors, environmental monitors, and community mesh networks are publicly broadcast and generally observable. None of these require authorization to receive, because none of them are private communications.

Aerial view of open landscape representing the open and public nature of broadcast RF signals
Public broadcast signals are designed to be received by anyone with appropriate equipment. Legal passive observation starts here.

Where Passive Listening Becomes Interception

The line runs through encryption and intent. Receiving Wi-Fi management frames passively, the beacon broadcasts that every access point transmits to announce its presence, is generally passive and generally legal. Capturing those frames and attempting to decrypt the traffic flowing through the network is not passive, and it is not legal without authorization.

Receiving Bluetooth advertisement packets is generally passive. Capturing the pairing exchange between a phone and a medical device and attempting to extract the session key is interception under the ECPA, regardless of whether you ever transmit anything.

Storing captured RF data that contains MAC addresses, persistent device identifiers, or location-correlated signal data may trigger state privacy laws in California, Virginia, and Colorado, and GDPR obligations for EU-resident data subjects, even if the capture itself was technically passive. Observation and storage are not the same act. Treat them differently.

Authorized Testing: What Permission Actually Looks Like

The phrase "I have permission" covers an enormous range of actual situations, most of which would not survive legal scrutiny. Verbal permission is not authorization. An email saying "sure, go ahead" is better but still weak. What authorized RF testing actually requires is a written document with specific elements, executed before the test begins.

Written Authorization vs. Verbal Permission

A valid RF testing authorization document needs to contain, at minimum: the identity of the system owner and their authority to grant permission; a description of the specific device or system being tested; the frequency range covered by the authorization; the start and end times of the authorized test window; a list of permitted actions; a list of explicitly prohibited actions; and an emergency stop contact who can halt the test if something goes wrong.

A friend saying "yeah, test my garage door" is not authorization. It's a conversation. Authorization is a document that would hold up if a federal agent asked you to produce it.

That last element matters more than people expect. RF testing doesn't always go exactly as planned. Having a named contact who can immediately stop a test protects both the tester and the system owner if something unexpected happens during the engagement.

Scoping Your Test to Avoid Collateral Exposure

RF signals don't stop at property lines. A test targeting a garage door opener operating on 315 MHz will emit RF energy that travels beyond the garage, beyond the driveway, and potentially into neighboring properties where other devices operate on the same or adjacent frequencies.

Long corridor with perspective lines representing the scope and reach of RF test signals
A test signal has no awareness of where your authorization ends. Scope documents need to account for that.

This is called collateral RF exposure, and it's a real consideration in any RF engagement. Owning the device you're testing doesn't give you authorization over the frequency environment shared with your neighbors. A test that inadvertently triggers a neighboring garage door, interferes with a nearby medical alert transmitter, or disrupts a baby monitor is still a test that caused interference, regardless of whether the authorization document was otherwise valid.

Penetration testing frameworks developed for network security engagements, including scope limitation, rules of engagement, and explicit prohibited actions, translate directly to RF testing and should be adapted for any serious engagement. The underlying logic is identical: define what you're allowed

Part 1 established the foundation: what the Flipper Zero actually is, how software-defined radio fits into the picture, and why this series treats wireless reconnaissance as a discipline rather than a hobby. If you haven't read it, go back. The concepts in that installment are load-bearing walls for everything that follows.

This part is different. Before any tool gets powered on, before any frequency gets scanned, before any signal gets logged, you need to understand the legal and ethical territory you're operating in. That's not a disclaimer to skim past. It's the governing layer of the entire series.

Sensitive Frequency Zones: Where Extra Caution Is Required

Not all RF observation carries the same risk. Scanning a 433 MHz ISM band signal in your driveway is a fundamentally different act than pointing an antenna at approach frequencies near a regional airport. The physics are similar. The consequences are not.

Aviation and Emergency Services Frequencies

The 108 to 137 MHz band is aviation territory: VOR navigation beacons, instrument landing systems, and air traffic control voice communications all live here. The 150 to 174 MHz and 450 to 470 MHz ranges carry emergency services traffic in most jurisdictions, including police, fire, and EMS coordination. Even passive observation near active transmission equipment in these bands carries elevated risk. Antenna placement, accidental harmonic generation from poorly shielded SDR hardware, and proximity to ground station receivers can all create interference you didn't intend to cause.

GPS operates at 1575.42 MHz. It looks like a single frequency. It is, in practice, one of the most legally protected signals on the electromagnetic spectrum.

$34,900
Fine levied by the FCC against a single GPS jammer operator whose device disrupted approach guidance at a commercial airport

The FAA has pursued criminal prosecution in GPS jamming cases, not civil fines. Proximity to airports should trigger serious reconsideration of your testing environment, even when your tools are receive-only.

High-Risk Frequency Zones

Aviation navigation and control: 108 to 137 MHz. Emergency services: 150 to 174 MHz and 450 to 470 MHz. GPS: 1575.42 MHz. Medical implant communications: 402 to 405 MHz. If your testing location is near an airport, hospital, or major utility site, these bands require extra caution regardless of whether you're transmitting.

Medical Device Bands

The Medical Implant Communication Service (MICS) band occupies 402 to 405 MHz. Pacemakers, implantable defibrillators, and insulin pump controllers use this spectrum. Interference in this band is not a regulatory abstraction. It is a life-safety issue. The FCC treats MICS interference with corresponding seriousness, and no research objective justifies operating transmitting equipment in this band without formal authorization and a controlled clinical environment.

Critical Infrastructure RF

Power grid SCADA systems, water treatment telemetry, and railroad signaling networks all depend on RF communications. Many operate in licensed bands across the VHF and UHF spectrum. These systems are legally protected under federal law, and interference, even unintentional interference, can trigger federal investigation. If your testing location is adjacent to a substation, a pumping station, or an active rail corridor, treat it as a restricted environment and move.


Documentation Rules: The Discipline of Honest RF Reporting

The most common mistake new RF researchers make isn't illegal. It's sloppy. They observe something, jump to a conclusion, and write the conclusion down as though it were the observation. That habit will eventually cost someone their credibility, their legal protection, or both.

A notebook and pen next to a laptop, representing careful documentation practice
Rigorous field notes aren't bureaucratic overhead. They're the difference between evidence and noise.

Record What You Observed, Not What You Assumed

The core principle is simple: write down exactly what the tool showed you. Frequency. Signal strength. Modulation type. Timestamp. Location. That's your observation. Everything else is analysis, and analysis belongs in a separate section of your log.

"I observed a signal at 433.92 MHz, approximately minus 65 dBm, AM modulation, at 14:32 local time, from the parking lot of 400 Industrial Blvd" is a fact. "This is a key fob replay attack in progress" is a theory. Write both if you want, but never in the same field.

Separating Evidence From Theory

Every log entry, every report, every responsible disclosure document should have explicit structural separation between observed data and interpretation. Use headers. Use columns. Use whatever format works for you, but make the separation visible and unambiguous.

This matters legally. Your logs can be subpoenaed. They can be reviewed by a court, examined during a responsible disclosure process, or scrutinized by a regulator. A log that conflates observation with interpretation looks like advocacy, not science. Sloppy documentation has caused legitimate security researchers to lose credibility at exactly the moment they needed it most. Don't hand anyone a reason to dismiss your work.

A single signal is not proof of anything. Document what you saw. Theorize separately. Never conflate the two.

A Single Signal Is Not Proof of Anything

One capture is a data point. It is not a vulnerability. It is not confirmation of a specific device type. It is not evidence of malicious activity. Correlation requires multiple observations across time, controlled testing conditions, and ideally a comparison baseline. A single 433 MHz burst could be a key fob, a weather sensor, a garage door opener, a wireless thermometer, or any of dozens of other common ISM devices.

The difference between a field observation log and a formal vulnerability report is substantial. A field log captures raw observations in real time. A vulnerability report synthesizes multiple observations, controlled tests, and contextual analysis into a defensible claim. Never submit a field log as a vulnerability report. The formats serve different purposes, and treating them as interchangeable is a credibility error that's hard to recover from.

Document what you saw. Keep your theories clearly labeled as theories. Revisit them when you have more data.


The Ethical Researcher's Mindset

Curiosity is what brings most people to RF research. That's fine. Curiosity is a reasonable starting point. It is not, by itself, a sufficient justification for every action that curiosity might suggest.

Curiosity Is Not License

There's a meaningful difference between exploring how wireless systems work and building capabilities to exploit systems you don't own. The first is education. The second is something else, and the law doesn't grade on a curve based on how interesting you found the project.

Define your purpose before you start any session. "I want to understand how my garage door opener communicates" is a defensible, bounded purpose. "I want to see what signals I can capture near the transit authority maintenance yard" is not, regardless of how technically interesting the results might be.

"The law does not evaluate your intentions. It evaluates your actions and their consequences. Those are different things, and assuming otherwise is how researchers end up in federal court."

Defensive Research vs. Offensive Capability Building

Defensive research means understanding how systems fail so you can protect them. You're studying a protocol to find its weaknesses, documenting those weaknesses, and either disclosing them responsibly or using that knowledge to harden systems you're authorized to protect. That work has genuine value.

Offensive capability building means developing tools or techniques to exploit systems you don't own or have authorization to test. Even if you never use those tools, building them can constitute preparation for a crime under several federal statutes.

18 U.S.C. ยง 1030
The Computer Fraud and Abuse Act provision most commonly applied to unauthorized RF-adjacent system access, including cases where no data was actually stolen

If you discover a genuine vulnerability in a commercial product during authorized testing, the ethical path is responsible disclosure. Contact the manufacturer directly with a clear, factual description of the finding. Give them reasonable time to respond, typically 90 days. If they don't respond or refuse to act, escalate to CERT/CC or the FCC depending on the nature of the vulnerability.

When to Stop and Who to Contact

If you accidentally capture something that appears sensitive, private, or potentially related to criminal activity, stop immediately. Don't log additional details. Don't share the capture. Consult a qualified attorney before taking any further action. Depending on the nature of the finding, the appropriate contacts are the device manufacturer, CERT/CC, the FCC, or legal counsel. The instinct to investigate further is understandable. Override it.


Pre-Flight Checklist: Before You Touch Any RF Tool

Every session should start here. Not after you've set up the antenna. Before you've opened the case.

Authorization and Scope Verification

Authorization and Scope 0/3

Environment and Frequency Safety Check

Environment and Frequency Safety 0/6

Documentation Setup

Documentation Setup 0/3

Everything covered in this part, the four hard rules, the sensitive frequency zones, the documentation discipline, the ethical researcher's mindset, forms the governing layer for every subsequent installment in this series. It doesn't expire after Part 2. It applies every time you power on a tool.

How This Framework Applies to Every Subsequent Part

Parts 3 onward get into the practical work: specific tools, specific frequency ranges, specific techniques for passive observation and signal analysis. Every one of those techniques will be framed explicitly within the passive observation or authorized testing categories established here. When a technique requires authorization, the series will say so directly. When a frequency zone requires extra caution, the series will flag it. The framework isn't background noise. It's the structure the technical content is built on.

If you ever feel uncertain about whether an action is within bounds during a later part of this series, come back here. The answer is usually in this installment. Bookmark the four hard rules. Save the documentation principles somewhere you'll actually find them. They're reference material, not one-time reading.

Part 3 moves into the hardware itself: how to configure a software-defined radio receiver for first use, what the signal display is actually telling you, and how to start building a baseline picture of the RF environment around you without touching anything you shouldn't.

How was this article?

Share

Link copied to clipboard!

You Might Also Like

Lee Foropoulos

Lee Foropoulos

Business Development Lead at Lookatmedia, fractional executive, and founder of gotHABITS.

🔔

Never Miss a Post

Get notified when new articles are published. No email required.

You will see a banner on the site when a new post is published, plus a browser notification if you allow it.

Browser notifications only. No spam, no email.

0 / 0