Vulnerabilities of Wireless Two-way Communications