-WEP weaknesses are discussed in more detail in:
-(In)Security of the WEP algorithm by Nikita Borisov, Ian Goldberg, and David Wagner (http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html)

-MAC address faking is very easy with same vendor’s cards as for example most Linux drivers let set the MAC address of the card excluding the vendor specific part