Continual advances in wireless communication technology offer additional protections against interference and jamming, but these same advances unfortunately also enable stronger attacks. Observant attackers can achieve significant gains by incorporating knowledge of the network under attack, and jammers can consider various metrics, including attack impact, energy efficiency, and stealth. Moreover, attackers can continually adapt parameters and behaviors to compensate for system dynamics, thwart detection, and save valuable resources.