Over the past several years, federal agencies have rapidly adopted the use of wireless networks (WN) for their info. systems. This report: (1) identifies leading practices and state-of-the-art technologies for deploying and monitoring secure WN; and (2) assesses agency efforts to secure WN, incl. their vulnerability to attack. To do so, the auditor reviewed publications and interviewed experts in wireless security. He also interviewed agency officials on wireless security at 24 major federal agencies and conducted additional testing at 5 agencies. This report identifies a range of leading security practices for deploying and monitoring secure WN and technologies that can help secure these networks. Illus. This is a print on demand report.