An adversarial can exfiltrate data modifying the RF components to send data with a different timing (and location), or with different frequencies. Antenna array can be used to send data into different beams. [1]
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.