This document discusses selective jamming attacks in wireless networks. It describes how an adversary with internal knowledge of network protocols and secrets can classify packets in real-time based on the first few symbols and then selectively jam important packets. This allows the adversary to launch effective denial-of-service attacks with low effort. The document then proposes and analyzes three schemes to prevent real-time packet classification and mitigate these selective jamming attacks while minimizing overhead.