The paper notes that these types of attacks can be carried out with off-the-shelf equipment and algorithms.