<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cool Tech &amp; Gadgets 📱⌚🎧⚡ Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<atom:link href="https://goodshepherdmedia.net/category/truthful-news/tech/cool-tech-gadgets/feed/" rel="self" type="application/rss+xml" />
	<link>https://goodshepherdmedia.net/category/truthful-news/tech/cool-tech-gadgets/</link>
	<description>Christian, Political, ‎‏‏‎Social &#38; Legal Free Speech News &#124; Ⓒ2024 Good News Media LLC &#124; Shepherd for the Herd! God 1st Programming</description>
	<lastBuildDate>Tue, 16 Sep 2025 05:51:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://goodshepherdmedia.net/wp-content/uploads/2023/08/Good-Shepherd-News-Logo-150x150.png</url>
	<title>Cool Tech &amp; Gadgets 📱⌚🎧⚡ Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<link>https://goodshepherdmedia.net/category/truthful-news/tech/cool-tech-gadgets/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>PATRIOT Act Author The NSA Is Actively Violating The Law</title>
		<link>https://goodshepherdmedia.net/patriot-act-author-the-nsa-is-actively-violating-the-law/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Tue, 16 Sep 2025 05:51:38 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[14th Amendment]]></category>
		<category><![CDATA[1st Amendment]]></category>
		<category><![CDATA[4th Amendment]]></category>
		<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Legal News The Motivation]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Rights]]></category>
		<category><![CDATA[Science & Engineering]]></category>
		<category><![CDATA[Supreme Court - SCOTUS]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[PATRIOT Act]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21927</guid>

					<description><![CDATA[PATRIOT Act Author: The NSA Is Actively Violating The Law Jim Sensenbrenner (R-WI), the author of the original USA PATRIOT Act, disagrees. In a amicus brief filed in support of the American Civil Liberties Union&#8217;s lawsuit against the National Security Agency&#8217;s bulk collection of U.S. phone records, Sensenbrenner argues that the government has gone far beyond what the legislation authorizes. [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="headline heading-xl ">PATRIOT Act Author: The NSA Is Actively Violating The Law</h1>
<p>Jim Sensenbrenner (R-WI), the author of the original USA PATRIOT Act, disagrees.</p>
<p>In a amicus brief filed in support of the American Civil Liberties Union&#8217;s lawsuit against the National Security Agency&#8217;s bulk collection of U.S. phone records, Sensenbrenner argues that the government has gone far beyond what the legislation authorizes.</p>
<p class="p1">Section 215, known as the business records provision, authorizes intelligence agencies to apply for information if &#8220;the records are relevant to an ongoing foreign intelligence investigation.&#8221;</p>
<p class="p1">In practice, the NSA uses section 215 to collect data pertaining to every phone call to, from, and within the U.S. in the name of combating terrorism.</p>
<p class="p1">Sensenbrenner and the other members of Congress who enacted Section 215 &#8220;did not intend to authorize the program at issue in this lawsuit or any program of a comparable scope,&#8221; according to the brief.</p>
<p class="p1">The brief goes on to propose this question (emphasis ours):</p>
<p class="p1">The NSA is gathering on a daily basis the details of every call that every American makes, as well as every call made by foreigners to or from the United States. <strong>How can every call that every American makes or receives be relevant to a specific investigation?</strong>&#8220;</p>
<p class="p1">Filed by the Electronic Frontier Foundation, the brief notes that Sensenbrenner &#8220;was not aware of the full scope of the program when he voted to reauthorize Section 215&#8221; and would have voted against it if he had known.</p>
<p class="p1">In Sensenbrenner&#8217;s words: &#8220;The suggestion that the administration can violate the law because Congress failed to object is outrageous. But let them be on notice: I am objecting right now.&#8221;  <a href="https://www.businessinsider.com/patriot-act-author-nsa-abused-its-power-2013-9">source</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CNBC Reporter mentions iPhone to Steve Jobs before any iphone was ever released </title>
		<link>https://goodshepherdmedia.net/cnbc-reporter-mentions-iphone-to-steve-jobs-before-any-iphone-was-ever-released/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 01 Sep 2025 22:20:19 +0000</pubDate>
				<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[📱Mobile📱]]></category>
		<category><![CDATA[🙂Fun Facts🙂]]></category>
		<category><![CDATA[before any iphone was ever released]]></category>
		<category><![CDATA[CNBC Reporter mentions iPhone to Steve Job]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21758</guid>

					<description><![CDATA[Steve Jobs interviewed by CNBC Reporter mentions iPhone to Steve Jobs before any iphone was ever released  5th Ave Store Opening (CNBC) 18 May 2006 Some forgettable CNBC reporter who managed at least one interesting question of Steve Jobs concerning AMD. Jobs, looking thin and pixelated, and dressed in a black, long-sleeved shirt of indeterminate neck [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="dusk:text-gray-100 mb-3 px-[15px] font-serif text-3xl font-semibold leading-none text-gray-700 dark:text-gray-100 sm:px-5 md:px-0 md:text-4xl lg:text-5xl">Steve Jobs interviewed by CNBC <span class="yt-core-attributed-string yt-core-attributed-string--white-space-pre-wrap yt-core-attributed-string--link-inherit-color" dir="auto" role="text">Reporter mentions iPhone to Steve Jobs before any iphone was ever released </span></h1>
<p><iframe title="Steve Jobs CNBC Interview, 5th Ave. Apple Store" width="640" height="480" src="https://www.youtube.com/embed/y6BFhRkUJEI?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h1>5th Ave Store Opening (CNBC) <small>18 May 2006</small></h1>
<p>Some forgettable CNBC reporter who managed at least one interesting question of Steve Jobs concerning AMD. Jobs, looking thin and pixelated, and dressed in a black, long-sleeved shirt of indeterminate neck variety, was speaking from the within the new store on Fifth Avenue, in New York.</p>
<div class="ars-interlude-container in-content-interlude mx-auto max-w-xl my-5"></div>
<p>Most of the interview was about the new store and the retail initiative, which Jobs described as being a &#8220;success beyond our wildest dreams.&#8221; When queried over the expense of flagship stores, such as the SOHO store in New York, Jobs responded that Apple has &#8220;never believed in the philosophy that flagship stores don&#8217;t make money,&#8221; and they do. To that end, he suggested Apple&#8217;s first response to the idea of a store underneath the plaza outside the GM building was, &#8220;subterranean, are you crazy?&#8221; However, Apple responded with a &#8220;crazy&#8221; idea of their own, the now famous 32 foot glass cube and brand beacon to generate traffic. Jobs mentioned that of the 300 employees at the store, half will be available for tech support, even at 2:00 AM, and who wouldn&#8217;t want to stroll the plaza at that hour with a couple of thousands dollars worth of hardware? The CNBC reporter also asked about the iPhone and was correctly snubbed, but more interesting was the response to a question about AMD chips, one that is well-suited for Da Vinci Code type analysis by Mac nerds on the Internet guessing Apple&#8217;s next move. I transcribed as best I could, of course.</p>
<blockquote><p>You know AMD&#8217;s got some interesting products at the very high end of the server space, but the part of the market we concentrate on the most is notebooks and consumer desktops, and for that Intel&#8217;s got the best chips. This Yonah chip, the Core Duo that they have right now, is the best chip in the world for notebooks and consumer desktops, so right now Intel&#8217;s road map looks very, very strong for the kinds of products—processors—we need for the products we build.</p></blockquote>
<p>Many will note the &#8220;right now&#8221; phrase, but I am more intrigued by the tacit admission of the shift away from the tower as the flagship product of Apple Computer. Of course, the fact that Apple has yet to make the transition to Intel for the pro desktops says as much, but it&#8217;s still strange to hear from the CEO&#8217;s mouth.</p>
<p><a href="https://arstechnica.com/gadgets/2006/05/4047/" target="_blank" rel="noopener">source</a></p>
<p><iframe title="Reporter mentions iPhone to Steve Jobs before it was even a thing, 2006" width="540" height="960" src="https://www.youtube.com/embed/aNgN5fnbk3o?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Detecting IMSI Catchers: Tools, Apps and Methods You Should Know</title>
		<link>https://goodshepherdmedia.net/detecting-imsi-catchers-tools-apps-and-methods-you-should-know/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 25 Aug 2025 21:49:26 +0000</pubDate>
				<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[Home Defense / Safety]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Phone Hacks]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[Apps and Methods You Should Know]]></category>
		<category><![CDATA[Cell-site simulators]]></category>
		<category><![CDATA[Detecting IMSI Catchers: Tools]]></category>
		<category><![CDATA[IMSI Catcher]]></category>
		<category><![CDATA[imsi catchers]]></category>
		<category><![CDATA[IMSI catchers: a security threat]]></category>
		<category><![CDATA[Stingray phone tracker]]></category>
		<category><![CDATA[Understanding How IMSI-Catchers Exploit Cell Networks]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21336</guid>

					<description><![CDATA[Detecting IMSI Catchers: Tools, Apps and Methods You Should Know An IMSI-catcher is a device that intercepts mobile phone communications, acting as a fake cell tower to eavesdrop on calls and track location data. It&#8217;s essentially a &#8220;man-in-the-middle&#8221; attack, placing the device between the target phone and the real cell network. While some security measures exist in [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="entry-title">Detecting IMSI Catchers: Tools, Apps and Methods You Should Know</h1>
<p><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-21340" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Detecting-IMSI-Catchers-Tools-Apps-and-Methods-You-Should-Know.jpg" alt="" width="800" height="800" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Detecting-IMSI-Catchers-Tools-Apps-and-Methods-You-Should-Know.jpg 800w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/Detecting-IMSI-Catchers-Tools-Apps-and-Methods-You-Should-Know-400x400.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/Detecting-IMSI-Catchers-Tools-Apps-and-Methods-You-Should-Know-150x150.jpg 150w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/Detecting-IMSI-Catchers-Tools-Apps-and-Methods-You-Should-Know-768x768.jpg 768w" sizes="(max-width: 800px) 100vw, 800px" /></p>
<p><span data-huuid="12916251619821288363">An IMSI-catcher is a device that intercepts mobile phone communications, acting as a fake cell tower to eavesdrop on calls and track location data. </span><span data-huuid="12916251619821288608">It&#8217;s essentially a &#8220;man-in-the-middle&#8221; attack, placing the device between the target phone and the real cell network. </span><span data-huuid="12916251619821288853">While some security measures exist in newer standards (like 3G), sophisticated attacks can bypass these, especially on older networks. </span><span data-huuid="12916251619821289098">These devices, like the <span class="M5tQyf"><strong>StingRay</strong>,</span> are used by law enforcement and intelligence agencies, but their use raises privacy and civil liberty concerns.<span class="pjBG2e" data-cid="0254da5d-6a60-4252-9748-b8be8c5ec492"><span class="UV3uM"> </span></span></span></p>
<h2>IMSI catchers: a security threat</h2>
<div id="aim-chrome-initial-inline-async-container" data-ved="2ahUKEwj5tOPnsMyOAxXsJEQIHf4cG7QQ_ZkOegYIAQgAEBQ" data-hveid="CAEIABAU">
<div data-processed="true">
<div class="CKgc1d" data-scope-id="turn" data-processed="true" data-complete="true">
<div class="Zkbeff" data-subtree="aimc" data-aimmrs="true" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQ2O0OegQIABAA" data-hveid="CAAQAA" data-processed="true" data-complete="true">
<div class="pWvJNd" data-processed="true" data-complete="true">
<div class="mZJni" data-container-id="main-col" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQ3KYQegQIABAD" data-processed="true" data-complete="true">
<div class="Y3BBE" data-hveid="CAAQEg" data-complete="true" data-processed="true">An IMSI catcher, sometimes called a Stingray, is a device that impersonates a legitimate cell tower. It works by mimicking cell tower signals and attracting nearby mobile devices, tricking them into connecting to the device instead of a genuine cell tower. Once a device connects, the IMSI catcher can capture the device&#8217;s unique identifier, the International Mobile Subscriber Identity (IMSI).<span class="" data-wiz-rootname="ohfaMd" data-complete="true" data-processed="true"><span class="vKEkVd" data-animation-atomic="" data-sae=""> <button class="rBl3me" tabindex="0" data-amic="true" data-icl-uuid="daf9ecda-6d56-4163-b71b-24f3c7686c4a" aria-label="View related links" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQye0OegQIABAT"></button></span></span></div>
<div class="Y3BBE" data-hveid="CAAQFA" data-processed="true" data-complete="true">This allows the IMSI catcher to:</div>
<ul class="U6u95" data-complete="true" data-processed="true">
<li data-hveid="CAAQFg" data-complete="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Track the device&#8217;s location</b> by analyzing the signal strength of the phone.</span></li>
<li data-hveid="CAAQFw" data-complete="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Identify and monitor activity</b>, and potentially even intercept communications, including SMS and calls, depending on the network protocol.</span><span class="" data-wiz-rootname="ohfaMd" data-complete="true"><span class="vKEkVd" data-animation-atomic="" data-sae=""> <button class="rBl3me" tabindex="0" data-amic="true" data-icl-uuid="670887ed-08de-4a8c-9ff5-7bf40ef17ffd" aria-label="View related links" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQye0OegQIABAY"></button></span></span></li>
</ul>
<div class="Y3BBE" data-hveid="CAAQGg" data-processed="true" data-complete="true">IMSI catchers can be used by law enforcement, and potentially by unauthorized actors including criminals or foreign intelligence services. The use of these devices raises significant privacy concerns due to the indiscriminate collection of data, which may include bystanders as well as targeted individuals.<span class="" data-wiz-rootname="ohfaMd" data-complete="true" data-processed="true"><span class="vKEkVd" data-animation-atomic="" data-sae=""> <button class="rBl3me" tabindex="0" data-amic="true" data-icl-uuid="54c6456f-6f79-45d6-8c0f-760c83c9443a" aria-label="View related links" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQye0OegQIABAb"></button></span></span></div>
<div class="Fsg96" data-processed="true" data-complete="true"></div>
<div class="otQkpb" role="heading" aria-level="3" data-processed="true" data-complete="true">Potential threats</div>
<ul class="U6u95" data-complete="true" data-processed="true">
<li data-hveid="CAAQHQ" data-complete="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Location Tracking:</b> IMSI catchers can track a phone&#8217;s location and movements.</span></li>
<li data-hveid="CAAQHg" data-complete="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Communication Interception:</b> Older generation networks (like 2G) are more vulnerable, allowing interception of calls and texts. While 3G, 4G, and 5G networks are more secure, some IMSI catchers can potentially force a device to downgrade to an older, less secure network.</span></li>
<li data-hveid="CAAQHw" data-complete="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Denial of Service:</b> IMSI catchers can also disrupt mobile network connectivity.</span><span class="" data-wiz-rootname="ohfaMd" data-complete="true"><span class="vKEkVd" data-animation-atomic="" data-sae=""> <button class="rBl3me" tabindex="0" data-amic="true" data-icl-uuid="b15d0dc0-c4f4-4750-be02-e68a02eaf8c9" aria-label="View related links" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQye0OegQIABAg"></button></span></span></li>
</ul>
<div class="Fsg96" data-complete="true" data-processed="true"></div>
<div class="otQkpb" role="heading" aria-level="3" data-processed="true" data-complete="true">Detection</div>
<div class="Y3BBE" data-hveid="CAAQIg" data-complete="true" data-processed="true">Detecting IMSI catchers with a smartphone alone can be difficult. Hardware-based detection systems provide a more reliable means of identification.<span class="" data-wiz-rootname="ohfaMd" data-complete="true" data-processed="true"><span class="vKEkVd" data-animation-atomic="" data-sae=""> <button class="rBl3me" tabindex="0" data-amic="true" data-icl-uuid="7d40a971-c6b4-42c0-8686-6b9a9a15c3a0" aria-label="View related links" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQye0OegQIABAj"></button></span></span></div>
<div class="Fsg96" data-processed="true" data-complete="true"></div>
<div class="otQkpb" role="heading" aria-level="3" data-processed="true" data-complete="true">Protecting yourself</div>
<ul class="U6u95" data-processed="true" data-complete="true">
<li data-hveid="CAAQJQ" data-complete="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Keep software updated:</b> Ensure your phone&#8217;s operating system and applications are up to date.</span></li>
<li data-hveid="CAAQJg" data-sae="" data-complete="true"><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Use encrypted communication tools:</b> Utilize apps like Signal or WhatsApp that offer end-to-end encryption.</span></li>
<li data-hveid="CAAQJw" data-complete="true" data-processed="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Consider using a VPN:</b> A VPN can encrypt your internet traffic.</span></li>
<li data-hveid="CAAQKA" data-complete="true" data-processed="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Enable Airplane mode:</b> When not actively using your phone, switching to airplane mode can help prevent connections to cell towers, including IMSI catchers.</span></li>
<li data-hveid="CAAQKQ" data-complete="true" data-processed="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Be aware of your surroundings:</b> Pay attention to suspicious devices resembling cell towers, especially in sensitive areas or during events like protests or rallies.</span></li>
<li data-hveid="CAAQKg" data-complete="true" data-processed="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Consider a Faraday cage:</b> A Faraday cage can block radio waves and protect your phone from interception.</span><span class="" data-wiz-rootname="ohfaMd" data-complete="true"><span class="vKEkVd" data-animation-atomic="" data-sae=""> </span></span></li>
</ul>
</div>
</div>
</div>
</div>
</div>
</div>
<p><iframe title="What is an IMSI Catcher?" width="640" height="360" src="https://www.youtube.com/embed/wqhtMiKaLk0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>IMSI catchers, sometimes referred to as cell-site simulators or fake cell towers, can be difficult to detect since they imitate real cell towers to capture mobile phone data. With proper cybersecurity testing measures, you can effectively be alert to these unwanted interceptions. Take a look at these common tools and methods that can efficiently assist in identifying IMSI catchers:</p>
<h2><strong>Top Techniques and Resources to Detect IMSI Catchers</strong></h2>
<h3><strong>1. Use Mobile Apps and Tools</strong></h3>
<p>Some apps and technologies are designed to monitor and detect irregularities in cell networks.</p>
<p><strong>SnoopSnitch (Android):</strong> This app analyses your phone’s network traffic and alerts you of strange cell tower behaviour. It requires access to low-level network data, which is mostly limited to particular Android phones equipped with Qualcomm chipsets.</p>
<p><strong>Cell Spy Catcher (Android):</strong> After starting the learning process of this app, it collects data on local networks to identify which one among them is a trap. Then it alerts you with a red interface screen.<br />
<strong>AIMSICD (Android):</strong> Detects IMSI catchers and reports on odd network activity, such as quick cell tower changes or downgrades to earlier network technologies (such as 2G). Phones switching to older network technologies usually happen due to IMSI catchers.</p>
<p><strong>Croatian Telecom’s AntiSpy (Android/iOS):</strong> An app that uses radio signal analysis to determine when your phone connects to a rogue cell tower.</p>
<p>Apple’s limitations on low-level network data access have led to a decrease in the number of apps accessible for iOS; however, network abnormalities can occasionally be found by keeping an eye on variations in signals.</p>
<h3><strong>2. Look for Unusual Network Activity</strong></h3>
<p>IMSI catchers can force phones to connect to low-security older networks (2G or 3G) to facilitate communication interceptions. Look out for:</p>
<p><strong>Downgraded connection:</strong> Your phone may unexpectedly switch from 4G/5G to 2G/3G or lose high-speed internet connection. Specifically, if it happens in an area that has outstanding coverage, it could be due to an IMSI catcher.</p>
<p><strong>Frequent disconnections:</strong> When an IMSI catcher is nearby, your phone might keep on disconnecting and reconnecting with the network.</p>
<p><strong>Suspicious network names:</strong> IMSI catchers can also broadcast non-standard or dubious network IDs. For example, a tower with an unusual name or ID might be a fake one.</p>
<h3><strong>3. Observe Battery and Signal Behaviour</strong></h3>
<p>IMSI catchers compel gadgets to transmit at faster speeds and consume more power.</p>
<p><strong>Rapid battery drain:</strong> If the battery on your phone runs out more quickly than usual, it can be because it’s transferring an unusual amount of data to a fake tower.</p>
<p><strong>Unusual signal intensity:</strong> An IMSI catcher may be indicated by abrupt, inexplicable changes in signal strength or highly fluctuating signal bars. Strong signals can be sent by these devices to overpower authorised cell towers.</p>
<h3><strong>4. Monitoring Tools for Experts</strong></h3>
<p>Advanced phone users with proper cybersecurity knowledge can utilise monitoring software or equipment to analyse cellular networks themselves.</p>
<p><strong>Software-defined radios (SDRs):</strong> SDR devices enable users to identify and analyse mobile phone signals. By identifying aberrant radio frequencies and patterns, an SDR can aid in the detection of IMSI catchers if used with the appropriate software.</p>
<p><strong>Cellular anomaly detectors:</strong> These are sophisticated technologies used by security experts and researchers that monitor local signals. These help detect abnormal cell tower behaviour that is essential in the <strong>current rise of data breaches</strong>, unexpected cyber attacks, or traffic demand in Australia.</p>
<h3><strong>5. Network Data Monitoring</strong></h3>
<p>Certified cyber security consultants in Australia suggest users to monitor network data. This includes the phone’s network logs like signal strength, base station ID, and encryption status that certain apps or customised firmware can access. Keeping an eye on this data can help determine when the phone connects to a dubious tower that may have less secure encryption or an unidentified ID.</p>
<h3><strong>6. Physical Indicators</strong></h3>
<p>IMSI catchers are usually non-stationary and can be implanted on vehicles or drones. So if you observe any strange and unknown vehicles or equipment within your local area and your phone network falters near it, it could be a clue.</p>
<h3><strong>7. Use Encrypted Communication</strong></h3>
<p>If you are wary of an IMSI catcher but are tech savvy or cannot locate it, resolve to the simple methods of using end-to-end encrypted apps. Switch to apps like WhatsApp, Signal, or Telegram for calls and texts for that while. These platforms prevent intercepted communications from being decoded, even if you do not know how to use tools for detecting IMSI catcher.</p>
<p><strong>Limitations</strong></p>
<p><strong>False positives:</strong> Certain apps, software, or devices may identify normal network issues as suspicious.</p>
<p><strong>Limited detection on iPhones:</strong> iOS restricts access to low-level radio data, making it more difficult to operate apps that monitor cellular networks. <a href="https://www.cyberneticgi.com/2024/10/15/detecting-imsi-catchers-tools-apps-and-methods/" target="_blank" rel="noopener">source</a></p>
<hr />
<h1 class="entry-title wp-block-post-title">With $20 of Gear from Amazon, Nearly Anyone Can Make This IMSI-Catcher in 30 Minutes</h1>
<p>With some dirt cheap tech I bought from Amazon and 30-minutes of set-up time, I was streaming sensitive information from phones all around me. IMSIs, the unique identifier given to each SIM card, can be used to <a href="https://motherboard.vice.com/en_us/article/zmkj38/emf-camp-imsi-catcher-" target="_blank" rel="noopener">confirm whether someone is in a particular area</a>. They can also be used as part of another attack to take over a person’s phone number and redirect their text messages. Obtaining this information was incredibly easy, even for a non-expert.</p>
<div class="wp-block-savage-platform-primis-video">
<div class="wp-block-savage-platform-primis-video__wrapper">
<div>
<div class="primisslate">
<div id="primis_container_div_687d600c04235">
<div id="primis_playerSekindoSPlayer687d600c04232">
<div id="Player-Div-SekindoSPlayer687d600c04232">
<div id="Video-Div-SekindoSPlayer687d600c04232">
<div id="pixelsDiv"></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p>This attack isn’t revolutionary in any way—IMSI-catchers <a href="https://motherboard.vice.com/en_us/article/nz798m/harris-imsi-catcher-picture-phone-tracking-device-in-the-wild" target="_blank" rel="noopener">are certainly not new</a>, and have become famous because they are commonly (and controversially) used by law enforcement to track suspected criminals. A commercial version made by Harris is called a “Stingray,” and they are sometimes called “cell-site simulators” or “fake cell towers.” This is because they spoof a cell phone tower’s connection, meaning that cell phones in the area will try to connect to it; in doing so, the IMSI-catcher is able to passively collect information about phones in the area.</p>
<div class="code-block code-block-1">
<div id="htlad-post-article-2" class="lngtd-dynamic-inarticle lngtd-dyn-ph">
<div id="vice_D_inarticle_2-1" class="lngtd-dynamic-ad-container" data-label="Advertisement" data-state="loaded"></div>
</div>
</div>
<p>Harris’s Stingray was so secretive that, for years, the <a href="https://arstechnica.com/tech-policy/2015/04/fbi-would-rather-prosecutors-drop-cases-than-disclose-stingray-details/" target="_blank" rel="noopener">FBI dropped criminal court cases</a> that used Stingrays rather than reveal the details of how the evidence was gathered.</p>
<p>But a DIY IMSI catcher is relatively trivial to setup, and the technology is accessible to anyone with a cheap laptop, $20 of gear, and, the ability to essentially copy and paste some commands into a computer terminal. This is about ease of access; a lower barrier of technical entry. In a similar way to so-called spouseware—<a href="https://motherboard.vice.com/en_us/article/53vm7n/inside-stalkerware-surveillance-market-flexispy-retina-x" target="_blank" rel="noopener">malware used by abusive partners</a>—surveillance takes on different character when it trickles down to more ordinary, everyday users. The significance and threat from IMSI-catchers is multiplied when a lot more people can deploy one.</p>
<p class="article__blockquote"><i><b>Got a tip? You can contact Joseph Cox securely on Signal on +44 20 8133 5190, OTR chat on jfcox@<span class="skimlinks-unlinked">jabber.ccc.de</span>, or email <span class="skimlinks-unlinked">joseph.cox@vice.com</span>.</b></i></p>
<p>For legal and technical reasons, our IMSI-catcher did not intercept text messages or phone calls, like more powerful versions can. It only captured IMSIs from devices, as well as provides some additional information such as the country and telecom operator of the phone. Motherboard did not store any of the collected data. You should be aware of the laws in your local region before attempting to do this; Motherboard does not condone or suggest you do anything illegal (and, even if legal, you shouldn’t use an IMSI catcher to do anything creepy.)</p>
<p>We’ll explain what each of these are, but in short, the process was:</p>
<ul class="wp-block-list">
<li>Buy a cheap, software defined radio</li>
<li>Install Ubuntu</li>
<li>Download IMSI-catcher script with its dependencies</li>
<li>Find the right frequency to scan for</li>
<li>Start scanning on that frequency and picking up IMSIs</li>
</ul>
<div class="code-block code-block-1"></div>
<div class="article__media--image"></div>
<p>As the name implies, a software defined radio, or SDR, is simply a radio that instead of having its feature baked in at a hardware level, can be controlled by a computer program. We bought <a href="https://www.amazon.co.uk/NooElec-NESDR-Mini-Previously-Compatible/dp/B009U7WZCA" target="_blank" rel="noopener" data-ml-dynamic="true" data-ml-dynamic-type="sl" data-orig-url="https://www.amazon.co.uk/NooElec-NESDR-Mini-Previously-Compatible/dp/B009U7WZCA" data-ml-id="0" data-ml="true" data-xid="fr1753047054953cei" data-skimlinks-tracking="xid:fr1753047054953cei">the ‘NooElec NESDR Mini’ from Amazon for around $20</a> and received it a few days later.</p>
<p>To get the SDR to talk to phones, I needed to give it some instructions. Fortunately, I didn’t need to write my own, but just take some code from GitHub. I used a Python tool <a href="https://github.com/Oros42/IMSI-catcher" target="_blank" rel="noopener">simply called ‘IMSI-catcher’</a>, written by the hacker known as Oros42. The program requires an up-to-date version of Ubuntu, a particular Linux distribution, that can be downloaded for free and written either to a USB stick or installed inside a virtual machine.</p>
<p>To install the IMSI-catcher software, I just followed the instructions on <a href="https://github.com/Oros42/IMSI-catcher" target="_blank" rel="noopener">the project’s GitHub</a>.</p>
<p>Once installed, I booted up grgsm_livemon, one of the programs included with the project. which presented a slider and a graph, to find a frequency to scan. This required a bit of trial and error—moving the frequency slider until finding a sweet spot where the graph represented a bell curve. The curve meant that the SDR had found what frequency nearby phones were broadcasting on. Depending on where you are, that frequency is going to be different.</p>
<div class="code-block code-block-1">
<div id="htlad-post-article-7" class="lngtd-dynamic-inarticle lngtd-dyn-ph">
<div id="vice_D_inarticle_1-4" class="lngtd-dynamic-ad-container" data-label="Advertisement"></div>
</div>
</div>
<p>Once I found the sweet spot, after a few seconds IMSIs started appearing on my screen.</p>
<figure class="wp-block-image"><img decoding="async" class="attachment-full size-full" src="https://www.vice.com/wp-content/uploads/sites/2/2018/11/1542319074607-IMG_4742.png" alt="imsi-catcher" width="1107" height="584" /><figcaption class="wp-element-caption">Caption: A redacted photo of IMSIs captured by the SDR and related script. Image: Motherboard</figcaption></figure>
<div class="code-block code-block-1">
<div id="htlad-post-article-8" class="lngtd-dynamic-inarticle lngtd-dyn-ph">
<div id="vice_D_inarticle_2-4" class="lngtd-dynamic-ad-container" data-label="Advertisement" data-state="loaded" data-google-query-id="CIOr6aC0zI4DFUjcuAgdCJ0Z_g">
<div id="google_ads_iframe_/16916245/vice/vice_D_inarticle_2_3__container__"></div>
</div>
</div>
</div>
<p>If I wanted to make the IMSI-catcher a bit more portable, I could theoretically run it on a Raspberry-Pi, a miniature computer you can buy for as little as $30 or cheaper, depending on what model you need. Note that the IMSI-catcher would still need to have Ubuntu on the Pi, which it is not traditionally designed for, <a href="https://linuxconfig.org/install-ubuntu-16-04-mate-or-ubuntu-18-04-on-raspberry-pi" target="_blank" rel="noopener">but it is likely possible</a>. I would also need to make sure the SDR is receiving enough power from the USB port.</p>
<p>In all, the process of making an IMSI-catcher didn’t take much time at all, as I thankfully didn’t hit any roadblocks. I just made sure I had the latest version of Ubuntu, followed the instructions carefully, and ended up with an IMSI-catcher on my laptop. <a href="https://www.vice.com/en/article/how-i-made-imsi-catcher-cheap-amazon-github/" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
<p><iframe title="This $50 Device lets anyone spy and track your phone!" width="640" height="360" src="https://www.youtube.com/embed/PpkLts5fdII?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<blockquote>
<h3><span style="color: #008080;"><a class="url fn" href="https://github.com/Oros42" rel="author" data-hovercard-type="user" data-hovercard-url="/users/Oros42/hovercard" data-octo-click="hovercard-link-click" data-octo-dimensions="link_type:self" aria-keyshortcuts="Alt+ArrowUp">Oros42</a></span><span class="mx-1 flex-self-stretch color-fg-muted">/</span><strong class="mr-2 flex-self-stretch"><a href="https://github.com/Oros42/IMSI-catcher" data-pjax="#repo-content-pjax-container" data-turbo-frame="repo-content-turbo-frame">IMSI-catcher DOWNLOAD HERE</a> i</strong>MSI CATHER SOFTWARE AND BUILD YOUR OWN!<span style="color: #ff0000;"> TO OF COURSE SOLVE SECURITY FLAWS IN YOUR OWN SYSTEM ONLY </span></h3>
<h3><span class="author flex-self-stretch"><a class="url fn" href="https://github.com/CellularPrivacy" rel="author" data-hovercard-type="organization" data-hovercard-url="/orgs/CellularPrivacy/hovercard" data-octo-click="hovercard-link-click" data-octo-dimensions="link_type:self" aria-keyshortcuts="Alt+ArrowUp">CellularPrivacy</a></span><span class="mx-1 flex-self-stretch color-fg-muted">/</span><strong class="mr-2 flex-self-stretch"><a href="https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector" data-pjax="#repo-content-pjax-container" data-turbo-frame="repo-content-turbo-frame">Android-IMSI-Catcher-Detector DOWNLOAD HERE </a></strong><span style="color: #008080;">IMSI CATHER SOFTWARE AND BUILD YOUR OWN!</span><span style="color: #ff0000;"> TO OF COURSE SOLVE SECURITY FLAWS IN YOUR OWN SYSTEM ONLY </span></h3>
</blockquote>
<p>&nbsp;</p>
<hr />
<h1>Gotta Catch &#8216;Em All: Understanding How IMSI-Catchers Exploit Cell Networks</h1>
<div class="panel-pane pane-node-content">
<article class="node node--whitepaper node--full node--whitepaper--full" role="article">
<div class="node__content">
<div class="field field--name-body field--type-text-with-summary field--label-hidden">
<div class="field__items">
<div class="field__item even">
<h2>Section 1: Introduction</h2>
<p>You’ve probably heard of Stingrays or IMSI-catchers, which belong to the broader category of “Cell Site Simulators” (CSSs). These devices let their operators “snoop” on the phone usage of people nearby. There’s a lot of confusion about what CSSs are actually capable of, and different groups—from activists to policy makers to technologists—understand them differently.</p>
<p>In the research community, there has been a tendency to dismiss the prevalence of CSS and the threat they pose to the public. Congress <a href="https://fcw.com/articles/2019/02/21/cell-site-simulators-congress.aspx">recently asked</a> the Department of Homeland Security for more information about their use by federal law enforcement, as well as state and local partners. It&#8217;s unclear how much oversight the Department has been exercising, and when it comes to state and local law enforcement, only a few cities have any protections at all. Many activists aren’t aware that CSSs could be in use around them without their knowledge, particularly during protests. The truth is that CSSs are significantly more widespread than most policy makers, researchers, and activists are aware, and their danger to privacy is more significant than most realize. Of course, it’s hard to acknowledge the prevalence of CSSs when law enforcement goes to great lengths to keep information about them from the public.</p>
<p>There is a plethora of low-level academic research in the area of cell network security, and many high-level posts that don’t really explain in any meaningful detail what’s going on with “IMSI-catcher” type cell network attacks. Our goal is to bridge that gap, and with this post we hope <strong>to make accessible the technical inner workings of CSSs, or rather, the details of the kind of attacks they might rely on</strong>. For example, what are the different kinds of location tracking attacks and how do they actually work? Another example: it’s also widely believed that CSSs are capable of communication interception, but what are the known limits around cell network communication interception and how does that actually work?</p>
<p>We won’t be updating this post with new kinds of attacks as they come out, and we can’t cover every potentially relevant detail of every attack we explain, but this post should form a basis for non-experts to better understand new attacks.</p>
<h2><a id="BackgroundInfo"></a>Section 2: Necessary background info</h2>
<p>There’s a lot of confusion about what CSSs actually do and how they do it. This confusion comes from the fact that the term “cell site simulator” actually encapsulates quite a variety of different cell network attacks that have evolved significantly over the last 25 years or so. Adding to the confusion is the fact that the term “IMSI-catcher” is both used interchangeably with “cell site simulator” and also refers to specific capabilities that some CSSs have.</p>
<p>A very important distinction when talking about CSSs is which cell network generations they use when operating. The term “cell network generation” refers to the complete set of operating protocols covering everything from how cell towers are laid out geographically to how a mobile phone establishes a connection with a cell tower.</p>
<p>Here’s a high-level overview of the most relevant cell network generations:</p>
<ul>
<li>2G (e.g. GSM): the oldest type of cell network still in use and still very widely used. 2G only supports calling/texting, but in 2.5G the capability to support data transmission (e.g. email and Internet access) was introduced.</li>
<li>3G (e.g. UMTS or CDMA2000): improved upon 2G by having much faster data rates (which could support video calls, for example) and adding better security (more on this later).</li>
<li>4G (e.g. LTE or WiMax): significantly faster speeds and better security.</li>
</ul>
<p>The specifications for these networks are developed by working groups organized by the 3GPP,<sup id="fnref1"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn1" rel="footnote">1</a></sup> an international organization that any group can apply to join (though it has a high membership fee). Members typically include mobile carriers, university research labs, and wireless gear manufacturers (including surveillance tech manufacturers).</p>
<p>It’s important to note that in practice there’s often a lot of variance between what the specifications say and what actually ends up being implemented. This is usually due to (1) implementers needing to differ from the specifications for practical reasons (many parts of the specifications get marked as optional), and (2) mistakes.</p>
<p>There’s a bit more vocabulary and background that needs to be introduced:</p>
<ul>
<li>IMSI (International Mobile Subscriber Identity): the unique identifier linked to your SIM card that is one of the pieces of data used to authenticate you to the mobile network. It’s meant to be kept private (because, as we’ll see later, it can be linked to your physical location and your phone calls/messages/data).</li>
<li>TMSI: upon first connecting to a network, the network will ask for your IMSI to identify you, and then will assign you a TMSI (Temporary Mobile Subscriber Identifier) to use while on their network. The purpose of the pseudonymous TMSI is to try and make it difficult for anyone eavesdropping on the network to associate data sent over the network with your phone.</li>
<li>IMEI (International Mobile Equipment Identity): the unique identifier linked to your physical mobile device.</li>
<li>Ki: a secret cryptographic key also stored on the SIM card used to authenticate your phone to the network (and prove you are who you say you are).</li>
<li>MCC (Mobile Country Code): your mobile country code, but not to be confused with a country’s <a href="https://en.wikipedia.org/wiki/List_of_mobile_telephone_prefixes_by_country">mobile telephone prefix</a>. For example, Canada’s MCC is 302, but its telephone prefix is +001.</li>
<li>MNC (Mobile Network Code): the code that represents which carrier you’re using. For example, 410 is one of AT&amp;T’s MNCs.</li>
<li>Cell ID: each cell tower is responsible for serving a small geographic area called a cell, which has a cell ID attached it.</li>
<li>LAC/TAC (“Location Area Code”): in GSM, groups of nearby cells are organized by ID into “Location Areas” (“LA” for short), with each LA’s identifier being referred to as a “Location Area Code”. In 4G these are respectively referred to as Tracking Area (TA) and Tracking Area Code (TAC).</li>
<li>BTS (“base station”): a more general term for devices like cell towers (and CSSs pretending to be cell towers).<sup id="fnref2"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn2" rel="footnote">2</a></sup></li>
</ul>
<p>It’s important to note that some of this terminology varies by network generation. For example, in LTE a base station is referred to as an eNodeB, and in 3G/UMTS the LAC and Cell ID are replaced by PSC (primary scrambling code) and CPI (Cell Parameter ID). For simplicity, we will be sticking to the above terminology.</p>
<h2><a id="OverviewAttacks"></a>Section 3: Overview of attacks</h2>
<p>To be clear, as far as we know no one (outside of government or surveillance tech vendors) has ever gotten their hands on a commercial CSS (e.g. a Harris Corp Stingray) and published publicly available details of its inner workings, so this information all comes from academic literature and the work of open source hackers attempting to reproduce how commercial CSSs might work.</p>
<p>There are three main categories of attacks that will be covered:</p>
<ol>
<li>Communication interception</li>
<li>Denial of service and service downgrading</li>
<li>Location tracking</li>
</ol>
<p>Practical implementation details are left out of the following explanations for the sake of brevity.</p>
<h3><a id="BasicIMSICatcher"></a>Section 3.1: Basic IMSI-catcher</h3>
<p>Classic “IMSI-catchers” simply record nearby IMSIs, and then don’t interact with their target phones in a significant way beyond that. They quite literally “catch” (i.e. record) IMSIs by pretending to be real base stations and then release the target phones (Paget, 2010). Let’s go over how they work in more detail.</p>
<p>In GSM networks, phones will try to connect to whatever base station is broadcasting at the highest signal strength.</p>
<p><img decoding="async" class="alignnone size-full wp-image-21365" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css.png" alt="" width="2400" height="1200" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css.png 2400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css-400x200.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css-1024x512.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css-768x384.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css-1536x768.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css-2048x1024.png 2048w" sizes="(max-width: 2400px) 100vw, 2400px" /></p>
<p>Once a phone has identified a base station as having the best signal strength, it can begin negotiating a connection to it. The base station first asks the phone to send its encryption capabilities to it. If the base station is a CSS rather than a cell tower, it can then either ignore the response or set it to have no encryption.<sup id="fnref3"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn3" rel="footnote">3</a></sup></p>
<p>After this, the base station sends an Identity Request, which the phone responds to with its IMSI. The phone does this because the IMSI is stored on your SIM card, which was issued by your mobile carrier, and the phone network needs to identify that you are in fact a paying customer associated with a mobile carrier. After receiving your IMSI, the CSS then releases your phone back to the real network and moves on to try and capture another phone’s IMSI. That’s all it takes to collect an IMSI from a nearby phone!</p>
<p>&nbsp;</p>
<div class="caption caption-center">
<div class="caption-width-container">
<div class="caption-inner">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21364" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image4imsicatchers.png" alt="" width="1999" height="1000" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image4imsicatchers.png 1999w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image4imsicatchers-400x200.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image4imsicatchers-1024x512.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image4imsicatchers-768x384.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image4imsicatchers-1536x768.png 1536w" sizes="(max-width: 1999px) 100vw, 1999px" /></p>
<p class="caption-text">The CSS sends an Identity Request to collect the target mobile phone’s IMSI. Afterwards, it proceeds to repeat this same action with other phones.</p>
</div>
</div>
</div>
<p>If law enforcement is operating such a CSS in a geographic area, once they’ve obtained the relevant IMSIs, they can then use legal process to get more data on all the users who were present.<sup id="fnref4"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn4" rel="footnote">4</a></sup></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21363" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised.png" alt="" width="2400" height="1200" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised.png 2400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised-400x200.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised-1024x512.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised-768x384.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised-1536x768.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised-2048x1024.png 2048w" sizes="(max-width: 2400px) 100vw, 2400px" /></p>
<p>From here, many more sophisticated attacks can be launched, but that’s how the most basic kind of IMSI-catchers work: they simply collect IMSIs during the connection procedure, then abort the connection procedure and move on to their next target.</p>
<p>In later protocols (e.g. 4G/LTE), phones are a bit smarter about not connecting to any random base station with high signal strength, so an attacker needs more involved techniques to convince a phone to connect to their CSS. See section 3.3 for details.</p>
<h3><a id="Interception"></a>Section 3.2: Communication interception</h3>
<p>As far as we know, communication interception between a mobile phone and a legitimate cell tower is <strong>only possible in GSM</strong> (as opposed to later 3G or 4G protocols). There are two reasons for this:</p>
<ol>
<li>Communicating over GSM doesn’t always require encryption.</li>
<li>Even when encryption is enabled, several of the cryptographic algorithms used in GSM can be broken (and in real time).</li>
</ol>
<p>Imagine that the CSS is trying to launch an active attack where it intercepts a phone’s communications. The CSS must be able to situate itself between the phone and the tower to be able to do so, which is what’s usually referred to as a “machine in the middle” (MitM) attack.</p>
<p>There are two main steps to completing the MitM:</p>
<ol>
<li>Spoofing authentication: the CSS needs to convince the network that it’s actually the targeted mobile phone. (Section 3.2.1)</li>
<li>Deal with any encryption the network tries to set (i.e. disable it or try to break it). (Section 3.2.2)</li>
</ol>
<h4><a id="Spoofing"></a>Section 3.2.1: Spoofing authentication</h4>
<p>Picking up from Section 3.1 where the CSS has already obtained a phone’s IMSI via an Identity Request:</p>
<ol>
<li>The CSS reaches out to a legitimate cell tower with a Location Update Request. This type of request is used to update the cell network about a phone’s location (specifically, its LAC), which the phone needs to do periodically in order for the network to be able to route calls and messages to it quickly.</li>
<li>In response to the Location Update Request, the cell network asks the CSS to identify itself using an Identity Request. The CSS responds using the stolen IMSI.</li>
<li>At this point the tower responds with a cryptographic challenge that requires the secret key Ki (stored on the SIM card) to solve. Since the CSS doesn’t have access to Ki, it passes it onto the phone to solve. The phone solves the challenge, passes it to the CSS, who then passes it back to the network.</li>
<li>After this, the network accepts the connection between it and the CSS as being authenticated.</li>
</ol>
<p>Reminder: this is only applicable to 2G.</p>
<p>&nbsp;</p>
<div class="caption caption-center">
<div class="caption-width-container">
<div class="caption-inner">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21362" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image2imsicatchers.png" alt="" width="1999" height="730" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image2imsicatchers.png 1999w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image2imsicatchers-400x146.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image2imsicatchers-1024x374.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image2imsicatchers-768x280.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image2imsicatchers-1536x561.png 1536w" sizes="(max-width: 1999px) 100vw, 1999px" /></p>
<p class="caption-text">An illustration of steps 1-4 from above on how the CSS is able to complete the authentication MitM.</p>
</div>
</div>
</div>
<h4><a id="Encryption"></a>Section 3.2.2: Dealing with encryption</h4>
<p>There are several encryption algorithms used in GSM, and at a high level, they have names like: A5/1, A5/2, etc &#8230; with A5/0 being used to indicate that no encryption is being used.</p>
<p>If the network tries to specify that it wants to communicate using encryption, the CSS can just respond by saying it doesn’t have encryption capabilities and defaults to A5/0. The CSS has now completed the MitM attack and can read the plaintext messages being sent between the phone and the real network.</p>
<p>Alternatively, if the network decides to use the A5/1 algorithm to communicate, this type of encryption can be broken in real time. The details of this attack are beyond the scope of this post, but you can read about it in the Barkan et al 2006 paper. Additionally, the A5/2 algorithm is so weak that its use <a href="https://en.wikipedia.org/wiki/A5/2">has been banned since 2006</a>. While there are <a href="https://en.wikipedia.org/wiki/KASUMI#Cryptanalysis">known attacks against A5/3</a>, there are no known real-time attacks.</p>
<h4><a id="UserAlert"></a>Section 3.2.3: Why aren’t users alerted that encryption is off?</h4>
<p>At this point, many people ask: why doesn’t their phone tell them something’s up? According to the GSM specifications, cell phone users are supposed to be notified when encryption is disabled, and in some markets they used to be. However, this caused a lot of confusion because:</p>
<ol>
<li>People would travel with their phones to places where cell towers were configured very differently (e.g. in some countries cell network encryption is banned) and it would cause a “Warning: encryption disabled” pop-up to come up a lot.</li>
<li>Cell towers everywhere were misconfigured, also causing this pop-up to appear a lot.</li>
</ol>
<p>These issues led to many confused consumers and support calls to mobile carriers, resulting in the warning ultimately being disabled.</p>
<h4><a id="ServiceDowngrading"></a>Section 3.2.4: Service downgrading</h4>
<p>Even though, as far as we know, communication interception is only possible in GSM, it’s trivial to downgrade a target cell phone’s connection from 3G or 4G to GSM (see Section 3.5 for more information). This is because in general the base station gets to pick whatever configuration settings it wants, which includes the ability to request a protocol downgrade. Alternatively, someone could jam the 3G or 4G bands by pumping lots of white noise into them, making it too noisy to establish a connection, and phones will downgrade in search of a usable signal. LTE service downgrading is covered in detail at the end of Section 3.5.</p>
<h3><a id="LTECSS"></a>Section 3.3: LTE CSS connection techniques</h3>
<p>It’s also important to understand how it’s possible for a CSS to get around the safeguards in LTE and other modern protocols that are meant to stop phones from connecting to any base station with a high enough power.</p>
<p>In GSM, phones are always scanning looking for a tower with a higher signal strength to connect to. However, in LTE if the signal strength is above a certain sufficient threshold, the phone will not scan for other towers to connect to in order to save power.</p>
<p>Additionally, in LTE phones keep track of a “nearest neighbors” list that is broadcast from the tower that they are connected to. If for any reason they lose the connection with the tower they’re connected to (or the ability to connect to it), they’ll try to connect to ones that were advertised in the nearest neighbors list first, before doing a full scan of the available LTE bands for other eligible cell towers.</p>
<p>So, how can an attacker force a phone using LTE into connecting to their CSS? One technique would be to masquerade as a tower in the nearest neighbor’s list (e.g. same frequency, same cell id, etc &#8230;) and transmit at a higher power, so the phone will eventually switch over.</p>
<p>But there is a faster technique! It relies on the fact that LTE frequencies are assigned various priorities (this is referred to as “absolute priority based cell reselection”), and if a phone sees that there is a base station operating on a higher priority frequency than the one it’s on, it must switch to it, regardless of its signal strength. To discover the higher priority frequencies used in a given area, all that’s required is to extract them from the unencrypted configuration messages from base stations, which anyone can monitor (Shaik et al, 2017).</p>
<p>Using these techniques, attackers can probably force even an LTE phone to connect to their CSS, which reveals the phone’s IMSI and allows followup attacks.</p>
<h3><a id="TrackingAttacks"></a>Section 3.4: Location tracking attacks</h3>
<p>Often when the dangers of CSSs are being discussed, the focus is on their communication interception ability. However, in practice the consequences of real time location tracking <a href="https://www.eff.org/deeplinks/2017/05/no-hunting-undocumented-immigrants-stingrays">are often much more severe</a>. The potential for location tracking by your cell provider is unavoidable, so the specific threat model being used here is a 3rd party (such as a law enforcement agency) trying to get your location without cooperation from your cell provider.</p>
<p>There are generally two types of location tracking that CSSs are capable of:</p>
<ol>
<li><strong>Presence testing:</strong> check if a phone is present in or absent from a geographic area (where geographic area usually means a “Location Area” from before, i.e. a group of cells)</li>
<li><strong>Fine-grained location:</strong> figure out the exact or rough GPS coordinates of a phone either through trilateration or by getting the phone to tell the attacker its exact GPS coordinates</li>
</ol>
<h4><a id="PresenceTesting"></a>Section 3.4.1: Presence Testing in LTE</h4>
<p><strong><em>Passive Presence Testing</em></strong></p>
<p>The simplest way to do presence testing in LTE doesn’t actually require someone to have what we usually consider a CSS (e.g. a device that pretends to be a legitimate cell tower). Instead, all that’s required is simple radio equipment to scan the LTE frequencies, e.g. an antenna, an SDR (Software Defined Radio), and a laptop. Passive presence testing gets its name because the attacker doesn’t actually need to do anything other than scan for readily available signals (Shaik et al, 2017).</p>
<p>A fundamental aspect of wireless technology is the paging model. When the network has a message it wants to route to a phone, it sends an “RRC paging message” which is received by every phone listening to their carrier’s paging frequency in that area (which is basically every phone),<sup id="fnref5"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn5" rel="footnote">5</a></sup> asking for that particular phone to contact the base station to negotiate completing a connection to receive a call or message. Thus, phones are constantly listening for RRC paging messages and receiving and discarding ones not addressed to them.</p>
<p>RRC is short for Radio Resource Control, which is the protocol used to communicate between a cell phone and a base station. The RRC takes care of connection establishment and paging notifications that you’re getting a message or phone call, among other things.</p>
<p>The exact way paging works varies based on several factors, including the type of message the network is trying to route to you. For example, say the network is trying to route a phone call to you. Phone calls are considered high priority (since there’s someone on the other side waiting for you to connect), so the network notifies every cell tower in the last Location Area your phone was in to send out the RRC paging message addressed to your phone (as opposed to only the last cell tower the phone was using). More on this later!</p>
<p>RRC paging messages are usually addressed to a TMSI, but sometimes IMSI and IMEI are also used. By monitoring these unencrypted paging channels, anyone can record the IMSIs and TMSIs the network believes is in a given area. In the next section, we’ll see how an attacker can correlate a TMSI to a specific target phone, as right now collecting TMSIs simply means recording pseudonyms.</p>
<p>Additionally, phones periodically transmit unencrypted messages about their location and measurements of cell service quality that anyone with the right equipment can easily intercept. Sometimes these messages contain the phone’s exact GPS location, but usually the information about the signal strength of nearby cells is enough to calculate the phone’s location. We’ll look at these measurement reports in detail in the Exact GPS Coordinates section below.</p>
<p><strong><em>Semi-Passive Presence Testing</em></strong></p>
<p>Semi-passive means that the attacker only uses network functions in ways in which they are meant to be used. An example of what it means for an adversary to be “semi-passive”: the attacker can text the person they’re trying to track (assuming they know their phone number) in order to generate a paging message being sent to their phone, but they can’t go and send malicious or malformed data to phones or towers in the area (Shaik et al, 2017).</p>
<p>In this section, we are going to cover two location attacks: one which checks for a phone in a given Location Area (“Basic Location Area Test”), and one which checks for a phone connected to a specific cell tower (the “Smart Paging Test” method, which has a much smaller radius of use).</p>
<p><strong><em>Basic Location Area Test</em></strong></p>
<p>The first step of a basic Location Area test is to trigger about 10-20 notifications to the target’s phone via phone calls while also monitoring the RRC paging messages that are sent out. To not alert the user, the attacker can almost immediately hang up after initiating the call so that the paging message makes it to the phone, but the user doesn’t actually get an incoming call notification.</p>
<p>Because there’s someone waiting on the other line to connect to you, phone calls are considered higher priority, so the network notifies every cell tower in the last Location Area the phone was in to send out the RRC paging message (as opposed to only the last cell tower the phone was using). The attacker can then use set intersection analysis (explained in <sup id="fnref6"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn6" rel="footnote">6</a></sup>) with their well-timed calls to figure out the target’s TMSI from the RRC messages.</p>
<p>&nbsp;</p>
<div class="caption caption-center">
<div class="caption-width-container">
<div class="caption-inner">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21360" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image7imsicatchers.png" alt="" width="1999" height="1000" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image7imsicatchers.png 1999w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image7imsicatchers-400x200.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image7imsicatchers-1024x512.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image7imsicatchers-768x384.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image7imsicatchers-1536x768.png 1536w" sizes="(max-width: 1999px) 100vw, 1999px" /></p>
<p class="caption-text">CSS triggering many RRC paging requests to determine if a phone is in a given LA.</p>
</div>
</div>
</div>
<p><strong><em>Smart Paging Test</em></strong></p>
<p>Usually the radius of a Location Area is quite large, so from here the attacker can use something referred to as “smart paging” (explained below) to figure out the exact cell tower the target is using (which translates to knowing the user’s location within a ~2 km radius) (Shaik et al, 2017).</p>
<p>Because general data messages (e.g. WhatsApp and FB Messenger messages) are not high priority, the network initially only broadcasts paging messages for them from the last tower the phone was known to be connected to (this is referred to as “smart paging”). Thus, once the attacker has confirmed the target’s location in a TA (“Tracking Area”), they can test various cells to find the target’s cell. (Note: we’re switching briefly from the “Location Area” terminology to “Tracking Area” here for the sake of a concept covered below.) Similar to before, they send timed WhatsApp or FB Messenger messages and use set intersection analysis to verify the TMSIs being sent in RRC messages in that cell.<sup id="fnref7"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn7" rel="footnote">7</a></sup></p>
<p>Note that in order for this to work, the attacker needs to either have equipment in every cell (which is expensive), or move about through cells repeating this procedure until they get a match.</p>
<h4><strong><a id="ActiveLocationTracking"></a>Section 3.4.2: Active location tracking and exact GPS coordinates</strong></h4>
<p>In this section, the attacker’s assumed goal is to find the target’s exact or rough GPS coordinates. In this section, we’ll be describing active attacks, meaning ones in which the attacker can use any means available to them to figure out their target’s information, including operating a CSS and sending malicious or false information to the phone or other cell towers.</p>
<p>In this scenario, suppose the attacker has a CSS and they’ve managed to lure their target into trying to connect using techniques described in Section 3.3. After completing the initial connection procedure steps, the phone enters into a CONNECTED state.</p>
<p>Now the attacker creates a “RRC Connection Reconfiguration” command, which contains the cell IDs of at least 3 neighbouring cell towers and their connection frequencies and sends this command to their target’s phone.</p>
<p>Usually, the “RRC Connection Reconfiguration” command is used to modify an existing connection to a base station, but the attacker is only interested in the target phone’s initial response to its message. This response contains the signal strengths of the previously specified cell towers, which can then be used to find the phone’s location via trilateration:</p>
<p>&nbsp;</p>
<div class="caption caption-center">
<div class="caption-width-container">
<div class="caption-inner">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21359" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised.png" alt="" width="2400" height="1200" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised.png 2400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised-400x200.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised-1024x512.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised-768x384.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised-1536x768.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised-2048x1024.png 2048w" sizes="(max-width: 2400px) 100vw, 2400px" /></p>
<p class="caption-text">In short, trilateration involves calculating the intersection of circles drawn around the previously specified cell towers, where the radius of each circle is a function of the reported signal strength. Note: trilateration is different than triangulation.</p>
</div>
</div>
</div>
<p>For newer phones and networks which support the “locationInfo-r10” feature, this report will also contain the phone’s exact GPS coordinates, meaning no trilateration calculations are required. The exact GPS coordinates are just a field in the response (Shaik et al, 2017).</p>
<p>In addition to the technique described above, there is another way to get similar trilateration and GPS data by using RLF (“Radio Link Failure”) reports, but we will not cover it in any detail as it’s similar to the techniques just covered.</p>
<h3><a id="DoSDowngrading"></a>Section 3.5: Denial of Service and Downgrading</h3>
<p>Cell network denial of service and protocol downgrade attacks are possible (and can have quite similar implementation details, as we’ll see below). Additionally, downgrade attacks make it such that a target phone can be forced down to a less secure protocol, where more severe privacy invasive attacks can be launched.</p>
<h4><a id="ProtocolDowngrade"></a>Section 3.5.1: Protocol downgrade attacks</h4>
<p>Suppose that the attacker has set up their CSS and tricked the target into trying to connect (which was covered in Section 3.3). After the initial connection procedure, the phone will send a “Tracking Area Update Request” (“TAU” for short). This kind of message is used by the phone to keep the cell network updated about the phone’s most recent location, so that the network can route calls to it faster. TAU Requests are usually sent by phones whenever they’re connecting to a new base station.</p>
<p>The CSS responds with a “TAU Reject” message. Within the Reject message is something referred to as the “EMM cause numbers”, which indicates why the message was rejected. In this case, the attacker sets it to 7 (“LTE services not allowed”).</p>
<p>Upon receiving this EMM value, the phone deletes all information it had about the previous real network it was connected to, and then puts itself in a state where it considers its SIM card to be invalid for LTE. It then searches for 3G and GSM networks to connect to, and will not again try to negotiate an LTE connection until it is rebooted (Shaik et al, 2017).</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21358" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image6imsicatchers.png" alt="" width="1999" height="1000" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image6imsicatchers.png 1999w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image6imsicatchers-400x200.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image6imsicatchers-1024x512.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image6imsicatchers-768x384.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image6imsicatchers-1536x768.png 1536w" sizes="(max-width: 1999px) 100vw, 1999px" /></p>
<p>The key reason why protocol downgrade attacks are so bad is that it renders LTE-capable phones vulnerable to attacks that normally only work on earlier protocols (e.g. the communication interception from Section 3.2).</p>
<h4><a id="DoS"></a>Section 3.5.2: Denial of Service (DoS)</h4>
<p>If the attacker is looking to launch a large scale DoS attack, the simplest thing is to jam the LTE frequencies by pumping them full of white noise. However, there are also techniques for DoS attacks that only target individual phones.</p>
<p>Launching a denial of service attack against an individual phone is exactly the same as the protocol downgrade attack described above, except the CSS responds with EMM cause number 8 (“LTE and non-LTE services not allowed”). The phone then puts itself in a state where it does not try to negotiate any network connections until it’s been rebooted.</p>
<p>Additionally, there has been some research done into denying select network services (e.g. only allowing SMS, and disallowing calls and data), but for the sake of space we will not be covering this. Please see Shaik et al, 2017 below for details.</p>
<h2><a id="Detection"></a>Section 4: Detection methods &amp; apps</h2>
<p>At this point you’re probably wondering:</p>
<ul>
<li>Are there ways to detect CSSs?</li>
<li>How to defend oneself from a CSS?</li>
<li>What led to these vulnerabilities in the cell networks and what do we do about them?</li>
</ul>
<p>These are three questions we’re going to explore in this section, and unfortunately they don’t have simple answers.</p>
<h3><a id="Methods"></a>Section 4.1: Detection methods</h3>
<p>To reiterate an important truth from before: a fundamental problem when researching detection methods is that <strong>we don’t know how commercial CSSs work</strong>. Instead we rely on how we think they might work based on research findings. It’s important to keep this in mind when going over some of the known detection methods below. This following list is not exhaustive, and instead is meant to be an introduction to this topic.</p>
<p><strong>Unusual base station parameters or fingerprints</strong></p>
<ul>
<li>There’s been some speculation that commercial CSSs mask themselves as cell towers that are normally in the area, but with some configuration parameters or characteristics being subtly off (e.g. broadcast power is suddenly much higher), enough so that the “fingerprint” of the tower is different. While configuration parameters and other characteristics differ across network operators, they’re usually uniform across a specific operator (Dabrowski et al, 2014).</li>
</ul>
<p><strong>Missing normal base station capabilities</strong></p>
<ul>
<li>It’s unlikely that a CSS manufacturer will have implemented the full set of capabilities of a normal base station. Missing capabilities, such as not broadcasting certain standard System Information Broadcast (SIB) messages, being unable to respond to certain standard requests, or there being very little to no paging traffic coming from the base station might be indicators of a CSS (Dabrowski et al, 2014).</li>
</ul>
<p><strong>Ephemerality</strong></p>
<ul>
<li>It’s generally believed that CSSs don’t stay in a single place for a significant period of time, and so a base station appearing for only a short period of time could be worth investigating. However, there are also many completely normal reasons why something would only appear for a short period of time. For example, it could simply be testing equipment, or if there’s a large event happening, it could be there to help facilitate the increased traffic load.</li>
</ul>
<p>The cell landscape is ever changing. Large scale and long term data collection is the best way to survey an area to be able to determine what’s normal versus what’s unusual. The <a href="https://seaglass.cs.washington.edu/">University of Washington’s Sea Glass project</a> is a great example of this.</p>
<p>You can read much more about this topic in Dabrowski et al’s IMSI-Catch Me If You Can: IMSI-Catcher-Catchers. To reiterate, while these could be indicators that something’s amiss, there are also many completely normal reasons (that have nothing to do with surveillance) as to why we’d be seeing unusual behaviour. E.g. testing equipment, temporary equipment brought in for a large event (e.g. at a sporting event), a cell tower crashed and upon restarting broadcasts temporarily incorrect values until it’s completely finished restarting, and so on.</p>
<h3><a id="Apps"></a>Section 4.2: Detection apps</h3>
<p>Many apps have been released that claim to alert users when it seems likely they’re connected to a CSS. The most popular ones include: <a href="https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector/wiki">Android IMSI-Catcher Detector (AIMSICD)</a>, <a href="https://opensource.srlabs.de/projects/snoopsnitch">SnoopSnitch</a>, <a href="https://sitch.io/">Sitch</a>, <a href="https://play.google.com/store/apps/details?id=kz.galan.antispy">GSM Spy Finder</a>, <a href="https://play.google.com/store/apps/details?id=com.skibapps.cellspycatcher&amp;hl=en_US">Cell Spy Catcher</a>. The quality of these apps varies, and some are still popular despite no longer being maintained.</p>
<p>Most of these apps implement at least some of the detection methods listed above and in Dabrowski et al. Even though sometimes multiple apps will have implemented the same detection methods, they won’t necessarily produce the same result when evaluating if a particular base station is suspicious or not (Borgaonkar et al, 2017). Let’s look at some examples of how detection apps have failed to include basic detection heuristics, as well as how there could be discrepancies in the evaluations they produce.</p>
<p><em>Varying power levels</em></p>
<p>One of the previously described detection methods is to track if a tower you’ve seen before suddenly broadcasts at much higher power. In Borgaonkar et al’s <em>White-Stingray: Evaluating IMSI Catchers Detection Applications</em>, researchers analyzed four of the previously mentioned apps and found that while most of them stored regular measurements of BTS power levels, none of them compared new values to historical values. This means that none of the apps could detect when towers had an unusually high broadcast power.</p>
<p><strong><em>LAC change</em></strong></p>
<p>As we saw in Section 3.2.1, when phones move to a new Location Area (or when they’re in the process of connecting to a base station that’s advertising as having a different LAC), they’ll need to update their information. As a result, they’ll eventually respond to an <em>Identity Request</em> (the command that reveals a phone’s IMSI). It’s generally believed that CSSs advertise as having a different LAC than the one that corresponds to the area they’re in, allowing them to exploit this mechanism to force phones to hand over their IMSIs or connect to them.</p>
<p>All previously mentioned detection apps monitor for LAC changes. As Borgaonkar et al point out, one of them checks to see if the LAC matches that of neighbouring base stations, and displays a warning to the user when it’s close to the edge of an LA. Since LAC changes are common when the user is near the edge of a LA, these warnings are often false positives. Another app stores all LACs the phone has seen before, and sends out warnings whenever a new one appears, meaning false positive warnings are constantly sent out when the user travels to new places. Another app defaults to marking anything broadcasting a LAC value between 0-9 as suspicious. This is an example of how even though all the detection apps have heuristics for detecting if a base station is suspicious based on a determination that a required value (the LAC) is unusual, their interpretations of how to do this and their implementations vary so much that they produce different results.</p>
<p>Because we don’t have global standards for what’s normal, and because things vary so wildly by country, carrier, etc, it’s difficult to come up with heuristics that could universally work for detecting CSSs. As a result, the apps that have attempted to tackle this problem so far have ended up having dramatically different thresholds for alerts.</p>
<h3><a id="Defending"></a><strong>Section 4.3: Defending against CSSs</strong></h3>
<p>CSSs have such a wide range of capabilities (based on what we know about possible cell network attacks they could be based on) that there is no feasible way to defend against all of the things they can do. Defense should begin by considering what someone’s specific threat model is and coming up with ways to defend after that.</p>
<p><strong><em>Examples</em></strong></p>
<p>At the time of writing, there are no publicly known confirmed examples of CSSs being used by law enforcement for communication interception or service denial. However, there are <a href="https://www.detroitnews.com/story/news/local/detroit-city/2017/05/18/cell-snooping-fbi-immigrant/101859616/">quite</a> <a href="http://cnsmaryland.org/interactives/spring-2016/maryland-police-cell-phone-trackers/index.html">a few</a> <a href="https://shadowproof.com/2019/05/08/detroit-police-spent-more-than-half-million-dollars-on-cell-site-simulator-to-track-peoples-locations/">examples</a> of CSSs being used for location tracking.</p>
<p>Since the main threat CSSs pose is that of real time location tracking, and there are no adjustable user settings one can change to affect this, there are currently no immediate steps one can take to defend themselves against these devices, other than either not having a cell phone, (which isn’t a reasonable option for many of us) or turning off and/or leaving behind your phone when doing something important.</p>
<p>Despite that, there are many steps you can take to defend against online surveillance, many of which we’ve outlined in EFF’s <a href="https://ssd.eff.org/">Surveillance Self Defense Guide</a>.</p>
<h2><a id="Conclusion"></a>Conclusion: the past &amp; future of cell network security</h2>
<p>The intersection of cell networks, security, and user privacy has historically not been an accessible field, but that’s slowly changing. Each year there is more research in this field being published and open source projects (such as <a href="https://github.com/srsLTE/srsLTE">srsLTE</a>) that enable this research are improving dramatically—and more people are starting to question why more work isn’t being done to fix these issues.</p>
<p>Cell network security <a href="https://www.nytimes.com/2018/12/26/opinion/cellphones-security-spying.html">is broken in some pretty fundamental ways</a>. It’s up to all of us over the next few years to demand lawmakers pay closer attention to the issue, and to put pressure on standards groups, carriers, network operators, and vendors to make necessary improvements. Together, we can protect and defend users’ privacy.</p>
<h2><a id="References"></a>References</h2>
<p><em>IMSI-Catch Me If You Can: IMSI-Catcher-Catchers.</em> Adrian Dabrowski, Nicola Pianta, Thomas Klepp, Martin Mulazzani, Edgar Weippl. <a href="https://www.sba-research.org/wp-content/uploads/publications/DabrowskiEtAl-IMSI-Catcher-Catcher-ACSAC2014.pdf">https://www.sba-research.org/wp-content/uploads/publications/DabrowskiEtAl-IMSI-Catcher-Catcher-ACSAC2014.pdf </a>(Dabrowski et al, 2014)</p>
<p><em>IMSI Catcher Detection Apps Might Not Be All That Good, Research Suggests.</em> Joseph Cox. <a href="https://www.vice.com/en_us/article/neeb5g/stingray-detection-apps-might-not-be-all-that-good-research-suggests">https://www.vice.com/en_us/article/neeb5g/stingray-detection-apps-might-not-be-all-that-good-research-suggests</a></p>
<p><em>Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication</em>. Elad Barkan, Eli Biham, Nathan Keller. <a href="http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/2006/CS/CS-2006-07.pdf">http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/2006/CS/CS-2006-07.pdf </a>(Barkan et al, 2006)</p>
<p><em>Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems.</em> Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi§and Jean-Pierre Seifert. <a href="https://arxiv.org/pdf/1510.07563.pdf">https://arxiv.org/pdf/1510.07563.pdf </a>(Shaik et al, 2017)</p>
<p><em>Practical Cellphone Spying</em>. Kristen Paget. Defcon 18. <a href="https://www.youtube.com/watch?v=fQSu9cBaojc">https://www.youtube.com/watch?v=fQSu9cBaojc </a>(Paget, 2010)</p>
<p><em>White-Stingray: Evaluating IMSI Catchers Detection Applications.</em> Ravishankar Borgaonkar, Andrew Martin, Shinjo Park, Altaf Shaik, Jean-Pierre Seifert. <a href="https://ora.ox.ac.uk/objects/uuid:15738ed0-c144-49e9-a4fa-466362cf7754">https://ora.ox.ac.uk/objects/uuid:15738ed0-c144-49e9-a4fa-466362cf7754 </a>(Borgaonkar et al, 2017)</p>
<h2>Notes</h2>
<ol>
<li id="fn1">The name “3GPP” is confusing since it contains “3G”. While they didn’t exist when GSM (a 2G technology) was originally being developed, they did later absorb some of the organizations that were responsible for developing GSM. It is still one of the main organizations that develops and maintains existing and future protocols. <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref1" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
<li id="fn2">Unfortunately, most phones usually don’t have an ability to specify connection settings. Recently some phones have begun to implement features like “use LTE only” though. <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref2" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
<li id="fn3">Unfortunately, most phones usually don’t have an ability to specify connection settings. Recently some phones have begun to implement features like “use LTE only” though. <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref3" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
<li id="fn4">According to the Department of Justice, some CSSs can directly collect a subscriber’s phone number, meaning LE can skip the step of subpoenaing a service provider to obtain the subscriber’s phone number. See page 6 of https://www.eff.org/files/2015/11/30/illinois.dist_.ct_.stingrays.pdf. <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref4" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
<li id="fn5">Generally, the network will first direct the message to the last known cell tower the phone was connected to, and that tower will send out a paging message to everyone listening on its paging frequency. If it doesn’t get a response, then it will spread out and try all the towers in a given Location Area, and so on. The exact details of how this works varies by type of data being routed (e.g. SMS vs phone call vs LTE data message) and by carrier. <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref5" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
<li id="fn6">Basically, you compare the paging identities in the RRC messages sent out after each short call you initiate, and extract the value(s) that are repeated the number of times you placed calls. You can read a much more here in the R<em>evealing Identities</em> section here: <a href="https://www-users.cs.umn.edu/~hoppernj/celluloc.pdf">https://www-users.cs.umn.edu/~hoppernj/celluloc.pdf</a> <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref6" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
<li id="fn7">Note that Facebook messages have the advantage of not needing to know your target’s phone number to be able to trigger a notification being sent to their phone! (The attacker doesn’t need to be Facebook friends with their target either, as Facebook Messenger messages sent to strangers end up in the ‘Other’ folder, but still trigger LTE push notifications that aren’t displayed to the user.) <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref7" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
</ol>
</div>
</div>
</div>
</div>
</article>
</div>
<div class="panel-pane pane-entity-field pane-node-field-attachments">
<h2 class="pane-title">Downloads</h2>
<div class="field field--name-field-attachments field--type-file field--label-hidden">
<div class="field__items">
<div class="field__item even"><span class="file"><img decoding="async" class="file-icon" title="application/pdf" src="https://www.eff.org/modules/file/icons/application-pdf.png" alt="PDF icon" /> <a title="whitepaper_imsicatchers_eff.pdf" href="https://www.eff.org/files/2019/07/09/whitepaper_imsicatchers_eff_0.pdf" type="application/pdf; length=999909">Gotta Catch &#8216;Em All</a></span></div>
</div>
</div>
</div>
<p><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks" target="_blank" rel="noopener">source</a></p>
<hr />
<div class="editor-content title-wrap">
<h1 class="h1 ">Understanding and Detecting IMSI Catchers around the World</h1>
</div>
<p>One of the good things about working in the area of core network security, is the opportunity to find new and unexpected types of attacks. These are attacks you didn’t even know could happen, much less have a chance to prevent. Finding these unexpected attacks doesn’t just happen though, it requires experience and investigation, but most importantly it needs the mindset to dig deeper into any strange events that are encountered, and try to understand them, rather than just assuming they are random malicious events.</p>
<p>In this particular case, we are discussing IMSI Catchers. First off, the term IMSI catcher is a misused and sometimes contradictory term however. As explained <a href="https://www.eff.org/pages/cell-site-simulatorsimsi-catchers" target="_blank" rel="noopener">here</a>, there are actually 2 types of equipment that those in the public (and many in the industry) would conflate into what they would call IMSI catchers.</p>
<ul>
<li>‘Active’ IMSI Catchers, also termed Cell Site Simulators (CSS) or Fake Base Stations – these attempt to force local devices to connect to a Call Site Simulator, in order to decrypt the conversation and texts, and to execute man in the middle interception. These would be considered the more ‘traditional’ type of IMSI catchers most would be aware of. Stingrays are also a common term used for these (named after the brand built by Harris Corporation). A good overview of how the Active IMSI /Cell Site Simulators work is <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks" target="_blank" rel="noopener">here</a>.</li>
<li>Passive IMSI Catchers – these passively listen into the paging of mobile devices as they move and register to new real Cell towers in the local area, in order to get the IMSI numbers of these devices. They are far less precise, and are unable to do any of the more sophisticated type of interception, but involve no interaction between the mobile device and the IMSI Catcher. An overview of how these could work, and how they function is <a href="https://harrisonsand.com/posts/imsi-catcher/" target="_blank" rel="noopener">here</a>.</li>
</ul>
<picture class="wp-image-82879 aligncenter"><source srcset="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1.png.webp 932w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-300x100.png.webp 300w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-768x257.png.webp 768w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-546x183.png.webp 546w" type="image/webp" sizes="(max-width: 800px) 100vw, 800px" data-lazy-srcset="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1.png.webp 932w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-300x100.png.webp 300w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-768x257.png.webp 768w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-546x183.png.webp 546w" /><img loading="lazy" decoding="async" class="entered lazyloaded" src="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1.png" sizes="(max-width: 800px) 100vw, 800px" srcset="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1.png 932w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-300x100.png 300w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-768x257.png 768w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-546x183.png 546w" alt="two diagrams showing the difference between active IMSI Catcher and Passive IMSI Catcher" width="800" height="268" data-lazy-srcset="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1.png 932w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-300x100.png 300w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-768x257.png 768w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-546x183.png 546w" data-lazy-sizes="(max-width: 800px) 100vw, 800px" data-lazy-src="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1.png" data-ll-status="loaded" /></picture>
<p>The primary difference between these two is that the more traditional Active IMSI Catcher/CSSs always involves some form of interaction with the mobile device, whereas the Passive IMSI Catcher doesn’t – it literally just listens in to the paging that occurs in the local areas as the mobile device changes between legitimate cell towers in the vicinity. This makes a big difference when it comes to detection of these IMSI Catcher types.</p>
<p>A lot of research has gone into various ways of detecting Active IMSI Catchers, by looking at how they differ from real Cell towers. One distinctive example of what an Active IMSI Catcher might do is the forced downgrading of their target mobile device to use a less secure radio interface. This detection of an Active IMSI Catchers can be difficult, involves a lot of local measurements and often can and has in the past led to false positives, but it gives some results. From the attacker’s perspective it’s also a trade-off in that they must make the effort to physically deploy an Active IMSI Catchers in a sensitive area, and then hope its radio activity doesn’t give it away. This is often why more sophisticated attackers may often resort to using attacks over signalling interfaces such as SS7 and Diameter to achieve their aims, which can be sent from any part of the world.</p>
<p>A Passive IMSI Catcher changes things somewhat. It still involves physical deployment of a system to listen in the local targeted area, but it is essentially undetectable on the radio interface, as it emits nothing that would allow it to be detected. This makes it very valuable to perform long-term surveillance in sensitive areas, when the goal is to have the least chance of being detected, while still trying to determine the IMSIs of who is in the local area.</p>
<p>The issue with both types of IMSI Catchers, from the attacker’s perspective, is that what they are left with are a collection of IMSIs from around the world. While this information may be useful, often you need more information to profile who has been ‘caught’. For Active IMSI Catcher deployments; the attackers may also intercept calls/text messages etc, so have a better idea of the target, but for passive IMSI catchers they won’t have that. What the attackers really need is the co-corresponding phone number – the MSISDN of the mobile device associated with the IMSI – in order to truly figure out the identities of the mobile device their IMSI catcher has caught.</p>
<p>This is where our analysis and investigation has come in. Over time, we have been seeing patterns of unusual requests over the SS7 interface, for particular IMSIs. Specifically, what we have been seeing is our Signalling Firewalls, deployed at multiple customer mobile operators, receiving suspicious MAP_RESTORE_DATA packets for IMSIs from unexpected sources. A MAP_RESTORE_DATA packet is a particular command that requests that the home operator sends details for a particular IMSI to the roamed-to network. Details in this case includes MSISDN (the actual phone number), call forwarding setting and other specific information. Further investigation showed that we always received this command when these IMSIs were near or attached to specific Cell Sites while roaming in a 3rd country and nowhere else.</p>
<picture class="wp-image-82881 aligncenter"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21343" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMSI_Catcher_sequence_wide-1536x662.png.webp" alt="" width="1536" height="662" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMSI_Catcher_sequence_wide-1536x662.png.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMSI_Catcher_sequence_wide-1536x662.png-400x172.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMSI_Catcher_sequence_wide-1536x662.png-1024x441.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMSI_Catcher_sequence_wide-1536x662.png-768x331.webp 768w" sizes="(max-width: 1536px) 100vw, 1536px" /></picture> <picture class="wp-image-82881 aligncenter"><source srcset="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide.png.webp 1985w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-300x129.png.webp 300w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1024x441.png.webp 1024w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-768x331.png.webp 768w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1536x662.png.webp 1536w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-546x235.png.webp 546w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1060x457.png.webp 1060w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1002x432.png.webp 1002w" type="image/webp" sizes="(max-width: 800px) 100vw, 800px" data-lazy-srcset="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide.png.webp 1985w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-300x129.png.webp 300w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1024x441.png.webp 1024w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-768x331.png.webp 768w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1536x662.png.webp 1536w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-546x235.png.webp 546w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1060x457.png.webp 1060w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1002x432.png.webp 1002w" /></picture>
<p>Our working theory, is that what we are observing is what we now call “<strong>IMSI Profilers</strong>”. These IMSI Profilers work in conjunction with IMSI Catchers – they take the list of IMSIs that have been detected and request profile information, in order to feed these phone numbers back to the IMSI catcher operator. The sequence of events that we believe to happen is shown above. From log analysis it also seems likely (but can’t be confirmed 100%) that the IMSI Catcher in the 3rd country is of the passive variety. In this particular case, the IMSI Profiler is using a source SS7 address (called a SCCP Global Title or GT) in a small European mobile operator that we have detected previously in our SIGIL/Signalling Intelligence system to be used by multiple surveillance companies, further confirming our suspicion that it is malicious.</p>
<p>Regardless of the IMSI catcher type used, this method of analysing incoming suspicious signalling activity gives the opportunity for mobile operators to partially protect their subscribers against IMSI Catchers around the world, something they didn’t have in the past. It won’t stop an Active IMSI Catcher from forcing a subscriber to connect to them, but it would stop additional information being retrieved. And in the case of passive IMSI catcher it is potentially one of the <strong>only ways</strong> to detect these remotely and block any more useful information being obtained.</p>
<p>In the long term, improvements in the new 5G radio and core network standards means that mobile operators should be able to greatly improve the ability to block IMSI Catchers over 5G. If these are implemented correctly and no loopholes are introduced then effective 5G IMSI Catchers may never arise. In the interim however, IMSI Catchers – both Passive and Active – are being used globally in the world to track and record individuals without their consent. By analysing incoming signalling traffic, and detecting and blocking these IMSI Profilers, mobile operators now have the opportunity to help protect their subscribers globally, regardless of how stealthy the IMSI Catcher is. <a href="https://www.enea.com/insights/adaptive-mobile-imsi-catchers/" target="_blank" rel="noopener">source</a></p>
<hr />
<div class="et_pb_row et_pb_row_1_tb_body">
<div class="et_pb_column et_pb_column_3_5 et_pb_column_3_tb_body et_pb_css_mix_blend_mode_passthrough et-last-child">
<div class="et_pb_module et_pb_post_title et_pb_post_title_0_tb_body et_pb_bg_layout_light et_pb_text_align_left">
<div class="et_pb_title_container">
<h1 class="entry-title">How to Catch an IMSI Catcher</h1>
</div>
</div>
<div class="et_pb_module et_pb_text et_pb_text_1_tb_body article-excerpt et_pb_text_align_left et_pb_bg_layout_light">
<div class="et_pb_text_inner">IMSI catchers, or fake antennas, are a common cell phone surveillance method. The FADe project helped local NGOs in Latin America detect and document these devices.</div>
</div>
<div class="et_pb_module et_pb_text et_pb_text_3_tb_body et_pb_text_align_left et_pb_bg_layout_light">
<div class="et_pb_text_inner"></div>
</div>
</div>
</div>
<div class="et_pb_row et_pb_row_2_tb_body">
<div class="et_pb_column et_pb_column_4_4 et_pb_column_4_tb_body et_pb_css_mix_blend_mode_passthrough et-last-child">
<div class="et_pb_module et_pb_post_content et_pb_post_content_0_tb_body news-body">
<h2 class="wp-block-heading"><strong>Civil Society Needs Help Catching IMSI Catchers </strong></h2>
<p>Law enforcement, criminals, and repressive governments monitor cell phone signals for the purpose of counter-terrorism, espionage, or political persecution. One common surveillance method is the placement of fake antennas—or <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#BackgroundInfo" target="_blank" rel="noreferrer noopener">IMSI catchers</a>—which imitate legitimate cell towers in order to track individual mobile subscribers, monitor their communications, or even disable their network connections.</p>
<p>In a high-profile example, <a href="https://nomada.gt/pais/la-corrupcion-no-es-normal/espionaje-ilegal-del-gobierno-aqui-esta-la-investigacion-de-nuestro-diario-parte-i/" target="_blank" rel="noreferrer noopener">a Guatemalan investigation revealed</a> large-scale <a href="https://www.eff.org/deeplinks/2018/12/where-government-hack-their-own-people-and-people-fight-back-latin-american" target="_blank" rel="noreferrer noopener">illegal spying</a> targeting “activists, entrepreneurs, politicians, journalists, diplomats, and social leaders.” Many governments engage in similar practices, often <a href="https://privacyinternational.org/strategic-areas/contesting-government-data-and-system-exploitation" target="_blank" rel="noreferrer noopener">without any meaningful oversight</a> or accountability.</p>
<p>The battle against authoritarian or illegal spying demands a range of methodologies—from legal policies and telecommunications regulations to physical interventions like “Faraday bags,” which shield devices in a casing that blocks electromagnetic transmissions. But the fight between eavesdroppers and victims (often human rights defenders) is not an even one. Most civil society organizations lack the equipment or expertise to effectively monitor phone surveillance.</p>
<h2 class="wp-block-heading"><strong>Equipping Civil Society with Resources to Expose Surveillance</strong></h2>
<p>To help Latin American NGOs level the playing field, <a href="http://www.southlighthouse.org/" target="_blank" rel="noreferrer noopener">South Lighthouse</a> created the <a href="http://fadeproject.org/" target="_blank" rel="noreferrer noopener">Fake Antenna Detection project (FADe)</a>, with support from Open Technology Fund’s <a href="https://www.opentech.fund/funds/internet-freedom-fund/" target="_blank" rel="noreferrer noopener">Internet Freedom Fund</a>. The project’s primary focus was detecting and documenting IMSI catchers—surveillance devices that imitate legitimate cell towers in order to track individual mobile subscribers, monitor their communications, or even disable their network connections.</p>
<p>The FADe team provided training, equipment, and other support to enable local partners to scan for IMSI catchers, analyze their findings and, ideally, make use of the results for advocacy. “A fundamental principle of the program has been partnership and capacitation,” says Andrés Schiavi, Executive Director of South Lighthouse.</p>
<p>FADe’s technology coordinator, Carlos Guerra says, “We wanted to open up a discussion for NGOs about how cell technology works and about how it <em>should</em> work to ensure optimal benefits to people’s safety and people’s rights.”</p>
<p>Using methods initially developed by the <a href="https://seaglass.cs.washington.edu/" target="_blank" rel="noreferrer noopener">SEAGLASS</a> project at the University of Washington and the <a href="https://www.eff.org/pages/crocodile-hunter" target="_blank" rel="noreferrer noopener">Electronic Frontier Foundation (EFF)</a>, FADe partners assembled simple sensors using a few off-the-shelf electronics, a smartphone, and a “feature phone” (a basic device resembling an early mobile phone that is usually more affordable and durable than a smartphone). The sensor setup sits in a moving vehicle and collects signal information over several weeks from local cell towers.</p>
<p>By analyzing the resulting data, groups can differentiate between signals consistent with legitimate cell towers and signals showing anomalous behaviors, such as a “tower” that changes locations (see animation below); or only operates during certain times; or uses frequencies or signal parameters not used anywhere else in the network. Another common warning sign is suspicious instructions sent to a device, such as a request to disconnect from all other towers, or a command to downgrade from 3G or 4G to a 2G network, which will make the device more vulnerable to surveillance.</p>
<p><em>A specific cell tower physically moving among different locations is one of the anomalous behaviors that can help identify an IMSI-catcher.</em></p>
<p>But analysis of these signals can be tricky, says Guerra. “There is no cookie-cutter method,” he says. The data is “noisy,” and cell providers configure their towers differently. It takes many days of monitoring to set a baseline that helps distinguish between legitimate and fake antennas.</p>
<p>The FADe team began working with local organizations in 2018. To mitigate technical and security risks, Schiavi says the first FADe partners were drawn from among South Lighthouse’s network of Latin American organizations. But interest grew rapidly, he says, in part because nothing comparable to the FADe/SEAGLASS approach had ever been available to these organizations. From 2019 to 2022, FADe worked with partners in <a href="https://fadeproject.org/?page_id=38" target="_blank" rel="noreferrer noopener">nine different countries</a>, documenting signals from almost 9,000 antennas, catching more than 150 likely IMSI-catchers.</p>
<p>One of FADe’s local partners, a digital security specialist from Nicaragua, says he was familiar with FADe in 2018 when he read the bombshell reports about Guatemalan surveillance. “The media found the police were using an IMSI-catcher,” he says. “We have known about methods like this in Central America, but we never had the evidence. I said, ‘We need to monitor that. I need to bring this to Nicaragua.&#8217;”</p>
<h2 class="wp-block-heading"><strong>Some of the Findings</strong></h2>
<p>The results in Nicaragua revealed <a href="https://fadeproject.org/?project=managua-2g-2" target="_blank" rel="noreferrer noopener">23 antennas around Managua</a> with anomalies that indicated the presence of an IMSI catcher. The local partner (who is remaining anonymous for security reasons) says the findings informed a wider discussion in Nicaragua about telephone eavesdropping. Although it was common knowledge that the government had an “open door” from the national ISP to eavesdrop online, the FADe data drove new public scrutiny and <a href="https://confidencial.digital/english/39-fake-antennas-discovered-monitoring-cell-phones-in-nicaragua/" target="_blank" rel="noreferrer noopener">media coverage</a> about the use of fake antennas.</p>
<p>Among the other FADe sites, <a href="https://www.reuters.com/article/us-mexico-tech-rights-trfn-analysis/birds-on-the-wire-concerns-over-mexico-cell-phone-surveillance-idUSKBN23J2CC/" target="_blank" rel="noreferrer noopener">Mexico</a> and <a href="https://openinternet.global/news/reality-digital-authoritarianism-venezuela" target="_blank" rel="noreferrer noopener">Venezuela</a> recorded an especially high number of fake antennas, as experts from <a href="https://poderlatam.org/" target="_blank" rel="noreferrer noopener">PODER</a> recounted <a href="https://www.washingtonpost.com/es/post-opinion/2020/05/31/datos-y-llamadas-de-celulares-en-riesgo-de-espionaje-por-antenas-falsas-en-america-latina/" target="_blank" rel="noreferrer noopener">in the Washington Post</a> (ES). Data from Caracas, Venezuela, showed <a href="https://fadeproject.org/?project=caracas" target="_blank" rel="noreferrer noopener">33 different devices</a> with irregular readings that could indicate IMSI-catchers. In Buenos Aires, Argentina, out of 1,000 cell towers monitored, <a href="https://fadeproject.org/?project=buenos-aires-2g&amp;lang=es" target="_blank" rel="noreferrer noopener">suspicious patterns</a> were found in 17 antennas, with most concentrated around the downtown and university areas. Notably, the suspicious antennas found in Buenos Aires were all on the 2G network, with no irregularities seen in the <a href="https://fadeproject.org/?project=buenos-aires-4g" target="_blank" rel="noreferrer noopener">smaller group</a> of devices on the 4G network, which is known to be harder to surveil. For summaries of the observations in all locations, see the project’s <a href="https://fadeproject.org/?page_id=38" target="_blank" rel="noreferrer noopener">results section</a>.  <a href="https://www.opentech.fund/news/how-to-catch-an-imsi-catcher/" target="_blank" rel="noopener">source</a></p>
</div>
</div>
</div>
<blockquote class="wp-embedded-content" data-secret="CwUzk2Zogw"><p><a href="https://goodshepherdmedia.net/cell-site-simulators-imsi-catchers-aka-stingray-phone-tracker/">Cell-site simulators/ imsi catchers aka Stingray phone tracker</a></p></blockquote>
<p><iframe class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;Cell-site simulators/ imsi catchers aka Stingray phone tracker&#8221; &#8212; Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content" src="https://goodshepherdmedia.net/cell-site-simulators-imsi-catchers-aka-stingray-phone-tracker/embed/#?secret=QHM7OzueSq#?secret=CwUzk2Zogw" data-secret="CwUzk2Zogw" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><iframe title="Pacamarra: IMSI catcher intercepts calls, not personal data | Morning Matters" width="640" height="360" src="https://www.youtube.com/embed/fTCnf6mAgxk?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><iframe title="RayHunter - Building the EFFs IMSI Catcher Detector" width="640" height="360" src="https://www.youtube.com/embed/SbSYSNuAetI?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><iframe title="NDSS 2025 - Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic" width="640" height="360" src="https://www.youtube.com/embed/jY3idyn11Tc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><iframe title="DICT: IMSI catchers may operate in public spaces, tracking, intercepting mobile communications | ANC" width="640" height="360" src="https://www.youtube.com/embed/iUIcCMG30ZY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cell-site simulators/ imsi catchers aka Stingray phone tracker</title>
		<link>https://goodshepherdmedia.net/cell-site-simulators-imsi-catchers-aka-stingray-phone-tracker/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Sun, 24 Aug 2025 21:49:24 +0000</pubDate>
				<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Phone Hacks]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[📱Mobile📱]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[Cell-site simulators]]></category>
		<category><![CDATA[Cell-site simulators/ imsi catchers]]></category>
		<category><![CDATA[imsi catchers]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21346</guid>

					<description><![CDATA[Cell-site simulators/ imsi catchers aka Stingray phone tracker Cell-site simulators/ imsi catchers Cell-site simulators, also known as Stingrays or IMSI catchers, are devices that masquerade as legitimate cell-phone towers, tricking phones within a certain radius into connecting to the device rather than a tower. Cell-site simulators operate by conducting a general search of all cell phones within [&#8230;]]]></description>
										<content:encoded><![CDATA[<h2>Cell-site simulators/ imsi catchers aka <span class="mw-page-title-main">Stingray phone tracker</span></h2>
<p><iframe title="5G IMSI Catchers Mirage5G IMSI Catchers Mirage" width="640" height="360" src="https://www.youtube.com/embed/Bg1HVaw1Sm4?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Cell-site simulators/ imsi catchers</h2>
<div dir="ltr">
<div class="content">
<p>Cell-site simulators, also known as Stingrays or IMSI catchers, are devices that<a href="https://www.eff.org/deeplinks/2015/01/2014-review-stingrays-go-mainstream"> masquerade as legitimate cell-phone towers</a>, tricking phones within a certain radius into<a href="https://www.justice.gov/opa/file/767321/download"> connecting to the device rather than a tower</a>.</p>
<p>Cell-site simulators operate by conducting a general search of all cell phones within the device’s radius, in violation of basic constitutional protections.  Law enforcement use cell-site simulators to pinpoint the location of phones with greater accuracy than phone companies and without needing to involve the phone company at all. Cell-site simulators can also log IMSI numbers, (International Mobile Subscriber Identifiers) unique to each SIM card, of all of the mobile devices within a given area. Some cell-site simulators may have advanced features allowing law enforcement to intercept communications.</p>
</div>
</div>
<p><iframe title="This $50 Device lets anyone spy and track your phone!" width="640" height="360" src="https://www.youtube.com/embed/PpkLts5fdII?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<div dir="ltr">
<div class="content">
<h3><span style="color: #008080;"><a href="https://www.opentech.fund/news/how-to-catch-an-imsi-catcher/" target="_blank" rel="noopener"><span style="color: #0000ff;">DOWNLOAD</span></a> IMSI CATHER SOFTWARE AND BUILD YOUR OWN!</span><span style="color: #ff0000;"> TO OF COURSE SOLVE SECURITY FLAWS IN YOUR OWN SYSTEM ONLY </span></h3>
<h3>How Cell-Site Simulators Work</h3>
<h4>Standard Communication</h4>
<p>Cellular networks are distributed over geographic areas called &#8220;cells.&#8221; Each cell is served by one transceiver, also known as a cell-site or base station. Your phone naturally connects with the closest base station to provide you service as you move through various cells.</p>
<figure class="image"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21348" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/content_CSS-2.png" alt="" width="700" height="373" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/content_CSS-2.png 700w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/content_CSS-2-400x213.png 400w" sizes="(max-width: 700px) 100vw, 700px" /><figcaption>
<div class="image-attribution">Source: EFF</div>
<div class="image-caption"></div>
</figcaption></figure>
<p>&nbsp;</p>
<p>Generally, there are two types of device used by law enforcement that are often referred to interchangeably: passive devices (which we will call IMSI catchers), and active devices (which we will call cell-site simulators.) Passive devices, as a rule, do not transmit any signals. They work by plucking cellular transmissions out of the air, the same way an FM radio works. They then decode (and sometimes decrypt) those signals to find the IMSI of the mobile device and track it.</p>
<p>Active cell-site simulators are much more commonly used by law enforcement, and work very differently from their passive cousins. Cellular devices are designed to connect to the cell site nearby with the strongest signal. To exploit this, cell-site simulators broadcast signals that are either stronger than the legitimate cell sites around them, or are made to appear stronger. This causes devices within range to disconnect from their service providers’ legitimate cell sites and to instead establish a new connection with the cell-site simulator. Cell-site simulators can also take advantage of flaws in the design of cellular protocols (such as 2G/3G/4G/5G) to cause phones to disconnect from a legitimate cell-site and connect to the cell-site simulator instead.  For the purposes of this article we will focus on active cell-site simulators.</p>
<p>It is difficult for most people to know whether or not their phone’s signals have been accessed by an active cell-site simulator, and it is impossible for anyone to know if their phone’s signals have been accessed by a passive IMSI catcher. Apps for identifying the use of cell-site simulators, such as SnoopSnitch, may not be verifiably accurate. Some more advanced tools have been built, which may be more accurate. For instance, security researchers at the University of Washington have<a href="https://seaglass.cs.washington.edu/"> designed a system to measure the use of cell-site simulators across Seattle</a>, and EFF researchers <a href="https://github.com/EFForg/crocodilehunter/">have designed a similar system</a>.</p>
<h3>What Kinds of Data Cell-Site Simulators Collect</h3>
<p>Data collected by cell-site simulators can reveal intensely personal information about anyone who carries a phone, whether or not they have ever been suspected of a crime.</p>
<figure class="image"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21349" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/content_CSS-3.png" alt="" width="700" height="438" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/content_CSS-3.png 700w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/content_CSS-3-400x250.png 400w" sizes="(max-width: 700px) 100vw, 700px" /><figcaption>
<div class="image-attribution">Source: EFF</div>
<div class="image-caption">Cell-site simulator surveillance: Cell-site simulators trick your phone into thinking they are base stations.</div>
</figcaption></figure>
<p>&nbsp;</p>
<p>Once your cellular device has connected to a cell-site simulator, the cell-site simulator can determine your location and trigger your device to transmit its  IMSI for later identification. If the cell-site simulator is able to downgrade the cellular connection to a 2G/GSM connection then it can potentially perform much more intrusive acts such as intercepting call metadata (what numbers were called or called the phone and the amount of time on each call),<a href="https://www.justice.gov/sites/default/files/criminal/legacy/2014/10/29/elec-sur-manual.pdf"> the content of unencrypted phone calls and text messages</a> and some types of data usage (such as websites visited).  Additionally, marketing materials produced by the manufacturers of cell-site simulators indicate that they<a href="https://info.publicintelligence.net/Gamma-GSM.pdf"> can be configured</a> to divert calls and text messages, edit messages, and even spoof the identity of a caller in text messages and calls on a 2G/GSM network.</p>
<h3>How Law Enforcement Uses Cell-Site Simulators</h3>
<p>Police can use cell-site simulators to try to locate a person when they already know their phone’s identifying information, or to gather the IMSI (and later the identity) of anyone in a specific area. Some cell-site simulators are small enough to fit in a police cruiser, or even on the vest of an officer, allowing law enforcement officers to drive to multiple locations, capturing from every mobile device in a given area—in some cases<a href="https://theintercept.com/2015/12/17/a-secret-catalogue-of-government-gear-for-spying-on-your-cellphone/"> up to 10,000 phones</a> at a time. These indiscriminate, dragnet searches include phones located in traditionally protected private spaces, such as homes and doctors’ offices.</p>
<p>Law enforcement officers have used information from cell-site simulators to investigate major and minor crimes and civil offenses.<a href="https://www.usatoday.com/story/news/2015/08/23/baltimore-police-stingray-cell-surveillance/31994181/"> Baltimore Police, for example,</a> have used their devices for a wide variety of purposes, ranging from tracking a kidnapper to trying to locate a man who took his wife’s phone during an argument (and later returned it to her).<a href="https://gizmodo.com/maryland-police-used-an-indiscriminate-cellphone-spy-to-1774831661"> In one case</a>, Annapolis Police used a cell-site simulator to investigate a robbery involving $56 worth of submarine sandwiches and chicken wings. In Detroit,<a href="https://www.eff.org/deeplinks/2017/05/no-hunting-undocumented-immigrants-stingrays"> U.S. Immigration and Customs Enforcement used a cell-site simulator</a> to locate and arrest an undocumented immigrant. In California, the San Bernardino county sheriff&#8217;s office <a href="https://arstechnica.com/tech-policy/2018/10/eff-sues-county-sheriff-claims-agency-wont-give-up-stingray-related-records/">used their cell-site simulator over 300 times in a little over a year</a>.</p>
<p>Police may have deployed cell-site simulators at protests. The Miami-Dade Police Department apparently<a href="http://cdn.arstechnica.net/wp-content/uploads/2013/09/miami-dade.pdf"> first purchased a cell-site simulator in 2003 to surveil protestors at a Free Trade of the Americas Agreement conference</a>. And it is suspected that they have been used <a href="https://www.law.georgetown.edu/american-criminal-law-review/wp-content/uploads/sites/15/2022/02/59-1-Owsley-George_Floyd_General_Warrants.pdf">more recently than that </a>during protests against police violence in 2020.</p>
<p>Cell-site simulators<a href="http://www.vocativ.com/389656/stingray-devices-in-trumps-america/"> are used</a> by the FBI, DEA, NSA, Secret Service, and ICE, as well as the U.S. Army, Navy, Marine Corps, and National Guard. U.S. Marshals and the FBI <a href="https://www.wsj.com/articles/americans-cellphones-targeted-in-secret-u-s-spy-program-1415917533">have attached cell-site simulators to airplanes</a> to track suspects, gathering massive amounts of data about many innocent people in the process. The<a href="https://www.texasobserver.org/texas-national-guard-spying-devices-surveillance/"> Texas Observer</a> also uncovered airborne cell-site simulators in use by the Texas National Guard. In 2023 it was revealed that ICE, DHS, and the Secret Service have all <a href="https://www.eff.org/deeplinks/2023/03/report-ice-and-secret-service-conducted-illegal-surveillance-cell-phones">used cell-site simulators many times without following their own rules on deployment or getting a warrant</a>.</p>
<p>A<a href="https://www.eff.org/deeplinks/2017/02/bipartisan-congressional-oversight-committee-wants-probable-cause-warrants-0"> recent Congressional Oversight Committee report</a> called on Congress to pass laws requiring a warrant before using cell-site simulators. Some states,<a href="https://www.eff.org/cases/californias-electronic-communications-privacy-act-calecpa"> such as California</a>, already require a warrant, except in emergency situations.</p>
<h3>Who Sells Cell-site Simulators</h3>
<p>Harris Corporation is the most well known company providing cell-site simulators to law enforcement. Their Stingray product has become the catchphrase for these devices, but they have subsequently introduced other models, such as Hailstorm,<a href="https://www.documentcloud.org/documents/3105805-Arrowhead-1-0-1-Release-Notes.html"> ArrowHead</a>,<a href="https://www.documentcloud.org/documents/3105793-Gemini-3-3-Quick-Start-Guide.html"> AmberJack, and KingFish</a>. Harris has stopped selling cell-site simulator technology to local law enforcement agencies but still works with the federal government. Digital Receiver Technology, a division of Boeing, is also a common supplier of the technology, often referred to as “<a href="https://www.revealnews.org/article/chicago-and-los-angeles-have-used-dirt-box-surveillance-for-a-decade/">dirtboxes</a>.”</p>
<p>Other sellers of cell-site simulators include Keyw, Octastic, Tactical Support Equipment, Berkeley Varitronics, Cogynte, X-Surveillance, Atos, Rayzone, Martone Radio Technology, Septier Communication, PKI Electronic Intelligence, Datong (Seven Technologies Group), Ability Computers and Software Industries, Gamma Group, Rohde &amp; Schwarz, Meganet Corporation. Manufacturers<a href="http://www.septier.com/law-enforcement/"> Septier</a> and<a href="https://info.publicintelligence.net/Gamma-GSM.pdf"> Gamma GSM</a> both provide information on what the devices can capture. The Intercept published a<a href="https://theintercept.com/2015/12/17/a-secret-catalogue-of-government-gear-for-spying-on-your-cellphone/"> secret, internal U.S. government catalogue</a> of various cellphone surveillance devices, as well as an<a href="https://theintercept.com/2016/09/12/long-secret-stingray-manuals-detail-how-police-can-spy-on-phones/"> older cell-site simulator manual</a> made available through a Freedom of Information Act request.</p>
<h3>Threats Posed by Cell-Site Simulators</h3>
<p>Cell-site simulators invade the privacy of everyone who happens to be in a given area, regardless of the fact that the vast majority have not been accused of committing a crime. These are <a href="https://www.hoover.org/sites/default/files/research/docs/lynch_webreadypdf.pdf">general searches</a> that violate the Fourth Amendment requirement that warrants “particularly” describe who or what is to be searched.</p>
<p>The use of cell-site simulators have been shrouded in government secrecy. Police have used cell-site simulators to track location data without a warrant, by deceptively obtaining “pen register” orders from courts without explaining the true nature of the surveillance. In Baltimore, a judge concluded that law enforcement had <a href="https://www.aclu.org/other/state-v-andrews-stingray-june-4-2015-transcript?redirect=state-v-andrews-stingray-june-4-2015-transcript">intentionally withheld the information</a> from the defense, in violation of their legal disclosure obligations. For a while, police departments tried to keep the use of cell-site simulators secret from not just the public but also the court system, withholding information from defense attorneys and judges—likely due in part to<a href="http://www.baltimoresun.com/news/maryland/baltimore-city/bs-md-ci-stingray-case-20150408-story.html"> non-disclosure agreements</a> with Harris Corporation. Prosecutors have<a href="https://www.washingtonpost.com/world/national-security/secrecy-around-police-surveillance-equipment-proves-a-cases-undoing/2015/02/22/ce72308a-b7ac-11e4-aa05-1ce812b3fdd2_story.html"> accepted plea deals</a> to hide their use of cell-site simulators and have even<a href="http://arstechnica.com/tech-policy/2015/04/fbi-would-rather-prosecutors-drop-cases-than-disclose-stingray-details/"> dropped cases</a> rather than revealing information about their use of the technology. U.S. Marshalls have<a href="https://arstechnica.com/tech-policy/2014/06/us-marshals-step-in-thwart-efforts-to-learn-about-cell-tracking-devices/"> driven files hundreds of miles</a> to thwart public records requests. Police have <a href="https://www.eff.org/deeplinks/2015/01/2014-review-stingrays-go-mainstream">tried to keep information secret</a> in Sarasota, Florida, Tacoma, Washington,<a href="https://arstechnica.com/tech-policy/2014/11/prosecutors-drop-key-evidence-at-trial-to-avoid-explaining-stingray-use/"> Baltimore, Maryland</a>, and St. Louis, Missouri.</p>
<p>To preserve this secrecy, the<a href="https://theintercept.com/2016/05/05/fbi-told-cops-to-recreate-evidence-from-secret-cell-phone-trackers/"> FBI told police officers to recreate evidence</a> from the devices, according to a document obtained by the nonprofit investigative journalism outlet Oklahoma Watch.</p>
<p>Cell-site simulators often disrupt cell phone communications within as much as a<a href="http://www.theglobeandmail.com/news/national/rcmp-listening-tool-capable-of-knocking-out-911-calls-memoreveals/article29672075/"> 500-meter radius</a> of the device, interrupting important communications and even <a href="http://www.theglobeandmail.com/news/national/rcmp-listening-tool-capable-of-knocking-out-911-calls-memoreveals/article29672075/">emergency phone calls</a>.  Cell-site simulators have been shown to disproportionately affect low-income communities and communities of color. In Baltimore, the use of cell-site simulators disproportionately impacted African-American communities, according to a map included in an <a href="https://www.eff.org/deeplinks/2016/08/civil-liberties-groups-file-fcc-complaint-arguing-baltimore-police-are-illegally">FCC complaint</a> that overlaid where Baltimore Police were using stingrays over census data on the city’s black population.</p>
<p><a href="https://www.eff.org/deeplinks/2018/08/blog-post-wyden-911-disruption-css">Cell-site simulators can also disrupt emergency calls</a>, such as 911 in the US, making them not only a menace to privacy but to public safety as well.</p>
<p>Cell-site simulators rely on vulnerabilities in our communications system that the government should help fix rather than exploit.</p>
<h3>EFF’s Work on Cell-Site Simulators</h3>
<p>For the reasons above, EFF opposes police use of cell site simulators. Insofar as law enforcement agencies are using cell-site simulators in criminal investigations, EFF argues that use should be limited in the following ways:</p>
<ol>
<li>Law enforcement should obtain individualized warrants based on probable cause;</li>
<li>Cell-site simulators should only be used for serious, violent crimes;</li>
<li>Cell-site simulators should only be used for identifying location of a particular phone;</li>
<li>Law enforcement must minimize the collection of data from people who are not the targets of the investigation.</li>
<li>Companies making cell-site simulators must confirm that their technology does not disrupt calls to emergency services.</li>
</ol>
<h4>Litigation</h4>
<p>We <a href="https://www.eff.org/press/releases/eff-files-foia-suit-over-us-marshals-spy-planes">filed a Freedom of Information Act lawsuit</a> to expose and shine light on the U.S. Marshals Service’s use of cell-site simulators on planes.</p>
<p>Along with the ACLU and ACLU of Maryland, we <a href="https://www.eff.org/deeplinks/2015/12/eff-joins-aclu-amicus-brief-supporting-warrant-requirement-cell-site-simulators">filed an amicus brief</a> in the first case in the country where a judge threw out evidence obtained as a result of using a cell-site simulator without a warrant.</p>
<p>We filed an amicus brief, along with the ACLU, pointing a court to facts indicating that the Milwaukee Police Department secretly used a cell-site simulator to locate a defendant through his cell phone without a warrant in U.S. vs. Damian Patrick. (The government then <a href="https://www.eff.org/document/us-v-patrick-government-letter-admitting-stingray-use">admitted</a> to having used it.)</p>
<h4>Legislation</h4>
<p>We were original co-sponsors of the <a href="https://www.eff.org/cases/californias-electronic-communications-privacy-act-calecpa">California Electronic Communications Privacy Act (CalECPA)</a>, along with the ACLU and the California Newspaper Publisher Association. This law requires California police to get a warrant before using a cell-site simulator. Any evidence obtained from a cell-site simulator without a warrant is inadmissible in court.</p>
<p>EFF supported S.B. 741, which requires transparency measures regarding the use of cell-site simulators. We <a href="https://www.eff.org/deeplinks/2016/04/here-are-79-policies-california-surveillance-tech-where-are-other-90">collected many of these policies</a>.</p>
<h4>Further Research</h4>
<p>We have written a report on the <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks">technical means possibly used by cell-site simulators called “Gotta Catch ‘em All”</a>, and we have developed a proof of concept technical means of <a href="https://github.com/EFForg/crocodilehunter">detecting cell-site simulators called Crocodile Hunter</a>.</p>
<h3>EFF Cases</h3>
<p><a href="https://www.eff.org/cases/state-maryland-v-kerron-andrews">State of Maryland v. Kerron Andrews</a></p>
<p><a href="https://www.eff.org/cases/us-v-damian-patrick">U.S. v. Damian Patrick</a></p>
<p><a href="https://www.eff.org/cases/us-marshals-airborne-imsi-catchers">EFF v. U.S. Department of Justice</a></p>
<h3><strong>Suggested Additional Reading</strong></h3>
<p><a href="https://www.aclu.org/issues/privacy-technology/surveillance-technologies/stingray-tracking-devices-whos-got-them">Stingray Tracking Devices: Who&#8217;s Got Them?</a> (ACLU)</p>
<p><a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2437678">Your Secret Stingray&#8217;s No Secret Anymore: The Vanishing Government Monopoly over Cell Phone Surveillance and Its Impact on National Security and Consumer Privacy</a> (Harvard Journal of Law and Technology)</p>
<p><a href="https://oversight.house.gov/hearing/examining-law-enforcement-use-of-cell-phone-tracking-devices/">Examining Law Enforcement Use of Cell Phone Tracking Devices</a> (House Oversight Committee)</p>
<p><a href="http://centerformediajustice.org/resources/the-relentless-eye/">The Relentless “Eye” Local Surveillance: Its Impact on Human Rights and Its Relationship to National and International Surveillance</a> (Center for Media Justice and others)</p>
<p><a href="https://www.justice.gov/opa/file/767321/download">Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology</a> (U.S. Department of Justice)</p>
<p><a href="https://theintercept.com/2016/09/12/long-secret-stingray-manuals-detail-how-police-can-spy-on-phones/">Long-Secret Stingray Manuals Detail How Police Can Spy on Phones</a>  (The Intercept)</p>
<p><a href="https://theintercept.com/2015/12/17/a-secret-catalogue-of-government-gear-for-spying-on-your-cellphone/">A Secret Catalogue of Government Gear for Spying on Your Cellphone</a> (The Intercept)</p>
<p><a href="https://gizmodo.com/american-cops-turns-to-canadian-phone-tracking-firm-aft-1845442778">Cops Turn to Canadian Phone-Tracking Firm After Infamous &#8216;Stingrays&#8217; Become &#8216;Obsolete&#8217;</a> (Gizmodo)</p>
</div>
</div>
<p><a href="https://sls.eff.org/technologies/cell-site-simulators-imsi-catchers" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
<hr />
<div id="tm-row-687d638d57d7d" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d58012" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-heading-687d638d582dd" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">IMSI Catcher System</h4>
</div>
<div id="tm-spacer-687d638d58705" class="tm-spacer"></div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<p>Cellular Interception Solutions help law enforcement authorities to acquire, intercept, analyze and manage cellular communications such as voice, SMS, and Call Related Information (CRI) data. This becomes vital as terrorists and criminal elements rely upon cellular mobile communications to carry out their subversive operations.</p>
<p>The initial step in the interception of any phone is identifying the presence of target phones in the areas of interest. This can be achieved using IMSI-Catcher. IMSI Catcher Systems are designed to collect basic identities (IMSI, IMEI) of 2G, 3G, and 4G mobile phones working within their coverage area without the knowledge of the service providers and the phone users. This enables the agencies to identify the presence of the target in their area of operation. These phones can then be intercepted by Passive, Semi-Active, or Hybrid Interception systems.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5895d" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d58b4f" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-spacer-687d638d58d40" class="tm-spacer"></div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d58e24" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d590a0" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="imsi_contact" class="tm-button-wrapper tm-animation move-up animate"><a class="tm-button style-flat tm-button-nm tm-button- has-icon icon-right" href="https://www.stratign.com/gsm-interception-system-v2/"><span class="button-text" data-text="Contact">Contact </span><i class="fa fa-phone-square"></i></a></div>
<div id="tm-spacer-687d638d59451" class="tm-spacer"></div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d59563" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5977f" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-heading-687d638d599fb" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">Passive GSM Interception System</h4>
</div>
<div id="tm-spacer-687d638d59e54" class="tm-spacer"></div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<p>Passive GSM Interception System is the most advanced monitoring system that does not transmit any information, hence making it completely undetectable by the operator or by the target that is being intercepted.</p>
</div>
</div>
<div id="tm-spacer-687d638d59f14" class="tm-spacer"></div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d59fdc" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5a1c4" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div class="wpb_raw_code wpb_content_element wpb_raw_html">
<div class="wpb_wrapper"><img loading="lazy" decoding="async" class="alignnone wp-image-21350" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-scaled.png" alt="" width="715" height="455" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-scaled.png 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-400x255.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-1024x652.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-768x489.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-1536x978.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-2048x1304.png 2048w" sizes="(max-width: 715px) 100vw, 715px" /></div>
</div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5a4d5" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5a6dc" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-heading-687d638d5a934" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">Features</h4>
</div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<ul>
<li>System is completely passive, and its presence cannot be detected either by the target or by the service provider.</li>
<li>Capable of intercepting 2G, 3G, 4G and 5G networks.</li>
<li>Capable of intercepting calls and messages.</li>
<li>Location of targets can be displayed on a digital map</li>
<li>Capable of intercepting 4 to 32 at a time from across multiple service providers.</li>
<li>Real-time passive deciphering of A5/1, A5/2, and A5/0 encrypted signals.</li>
<li>System stores intercepted voice calls, SMS, and protocol information on the control PC hard drive.</li>
<li>Addition configuration of Open-Source Intelligence (OSINT), Voice Print Analysis, Link analysis.</li>
</ul>
</div>
</div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5af4e" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5b1de" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-spacer-687d638d5b36c" class="tm-spacer"></div>
<div id="tm-heading-687d638d5b46a" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">Semi-Active GSM Interception System</h4>
</div>
<div id="tm-spacer-687d638d5b8ad" class="tm-spacer"></div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<p>Semi-Active GSM Interception System can intercept incoming and outgoing communications between the Base Station, and the Mobile Handset using the principle of Man-in-the-Middle, without being detectable by the operator or by the target that is being intercepted.</p>
</div>
</div>
<div id="tm-spacer-687d638d5b96f" class="tm-spacer"></div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5ba45" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5bc44" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div class="wpb_raw_code wpb_content_element wpb_raw_html">
<div class="wpb_wrapper"><img loading="lazy" decoding="async" class="alignnone wp-image-21351" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-scaled.png" alt="" width="865" height="551" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-scaled.png 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-400x255.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-1024x652.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-768x489.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-1536x978.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-2048x1305.png 2048w" sizes="(max-width: 865px) 100vw, 865px" /></div>
</div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5beb6" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5c149" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-heading-687d638d5c3d3" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">Features</h4>
</div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<ul>
<li>Interception does not require the service provider’s assistance or SIM for operation.</li>
<li>Real-time listening of the intercepted cell phone calls.</li>
<li>Capable of intercepting 2G, 3G, 4G and 5G networks.</li>
<li>Real-time deciphering of A5/1, A5/2, and A5/0 encrypted signals.</li>
<li>Capable of intercepting voice, SMS, and Call Related Information (CRI) data.</li>
<li>Location of targets can be determined with an accuracy for up to 5 meters.</li>
<li>Handheld direction finder for better location accuracy</li>
<li>Selective jamming capability using which the operator can disable certain services of the target like outgoing call, incoming call, SMS, etc.</li>
<li>Spoofing and manipulating Text Messages and Calls.</li>
<li>Capable of intercepting 4 to 32 at a time from across multiple service providers.</li>
<li>Addition configuration of Open-Source Intelligence (OSINT), Voice Forensics, Keyword Spotting.</li>
</ul>
</div>
</div>
<div id="tm-spacer-687d638d5c8bb" class="tm-spacer"></div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5c9a5" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5cbf8" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-spacer-687d638d5cd57" class="tm-spacer"></div>
<div id="tm-heading-687d638d5cdf7" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">Hybrid GSM Interception System</h4>
</div>
<div id="tm-spacer-687d638d5d1f8" class="tm-spacer"></div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<p>Hybrid GSM Interception system is a combination of Passive and Semi-Active interception systems. The basic functioning of the system is like the passive system and is turned into an active one only when required.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5d378" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5d593" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div class="wpb_raw_code wpb_content_element wpb_raw_html">
<div class="wpb_wrapper"><img loading="lazy" decoding="async" class="alignnone wp-image-21352" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-scaled.png" alt="" width="774" height="493" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-scaled.png 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-400x255.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-1024x652.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-768x489.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-1536x978.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-2048x1305.png 2048w" sizes="(max-width: 774px) 100vw, 774px" /></div>
</div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5d82b" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5d9eb" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-heading-687d638d5dbb8" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">Features</h4>
</div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<ul>
<li>In Passive Mode all features of the passive system will apply.</li>
<li>In Semi-Active Mode all features of the Semi-Active Mode system will apply. <a href="https://www.stratign.com/gsm-interception-system-v2/" target="_blank" rel="noopener">source</a></li>
</ul>
</div>
</div>
</div>
</div>
</div>
</div>
<hr />
<h1 class="entry-title">Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic</h1>
<p><strong>Tyler Tucker (University of Florida), Nathaniel Bennett (University of Florida), Martin Kotuliak (ETH Zurich), Simon Erni (ETH Zurich), Srdjan Capkun (ETH Zuerich), Kevin Butler (University of Florida), Patrick Traynor (University of Florida)</strong></p>
<p>&nbsp;</p>
<p>IMSI-Catchers allow parties other than cellular network providers to covertly track mobile device users. While the research community has developed many tools to combat this problem, current solutions focus on correlated behavior and are therefore subject to substantial false classifications. In this paper, we present a standards-driven methodology that focuses on the messages an IMSI-Catcher textit{must} use to cause mobile devices to provide their permanent identifiers. That is, our approach focuses on causal attributes rather than correlated ones. We systematically analyze message flows that would lead to IMSI exposure (most of which have not been previously considered in the research community), and identify 53 messages an IMSI-Catcher can use for its attack. We then perform a measurement study on two continents to characterize the ratio in which connections use these messages in normal operations. We use these benchmarks to compare against open-source IMSI-Catcher implementations and then observe anomalous behavior at a large-scale event with significant media attention. Our analysis strongly implies the presence of an IMSI-Catcher at said public event ($p &lt;&lt; 0.005$), thus representing the first publication to provide evidence of the statistical significance of its findings. <a href="https://www.ndss-symposium.org/ndss-paper/detecting-imsi-catchers-by-characterizing-identity-exposing-messages-in-cellular-traffic/" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
<blockquote class="wp-embedded-content" data-secret="148xCekYPH"><p><a href="https://goodshepherdmedia.net/detecting-imsi-catchers-tools-apps-and-methods-you-should-know/">Detecting IMSI Catchers: Tools, Apps and Methods You Should Know</a></p></blockquote>
<p><iframe class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;Detecting IMSI Catchers: Tools, Apps and Methods You Should Know&#8221; &#8212; Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content" src="https://goodshepherdmedia.net/detecting-imsi-catchers-tools-apps-and-methods-you-should-know/embed/#?secret=adQrYGaIcF#?secret=148xCekYPH" data-secret="148xCekYPH" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ESP32-DIV: Your Swiss Army Knife for Wireless Networks</title>
		<link>https://goodshepherdmedia.net/esp32-div-your-swiss-army-knife-for-wireless-networks/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Tue, 15 Jul 2025 20:12:18 +0000</pubDate>
				<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[ESP32-DIV]]></category>
		<category><![CDATA[ESP32-DIV Your Swiss Army Knife for Wireless Networks]]></category>
		<category><![CDATA[ESP32-Div: An ESP32 Based Swiss Army Knife for Wireless Networks]]></category>
		<category><![CDATA[Hacking Wireless Networks]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21116</guid>

					<description><![CDATA[ESP32-DIV: Your Swiss Army Knife for Wireless Networks ESP32-Div: An ESP32 Based Swiss Army Knife for Wireless Networks Hardware of ESP32-DIV The ESP32-DIV is a compact yet powerful device, built from two main sections: the Main Board and the Shield. Together, they enable Wi-Fi, BLE, 2.4GHz, and Sub-GHz operations. Below is a breakdown of the hardware components. 🛠️ Main Board [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="elementor-heading-title elementor-size-default">ESP32-DIV: Your Swiss Army Knife for Wireless Networks</h1>
<blockquote>
<h4><span style="color: #0000ff;">ESP32-Div: An ESP32 Based Swiss Army Knife for Wireless Networks</span></h4>
</blockquote>
<div class="markdown-heading">
<h1 class="heading-element">Hardware of ESP32-DIV</h1>
<p><iframe title="ESP32 DIV DIY INSTALLATION @techcifer" width="640" height="360" src="https://www.youtube.com/embed/AR7GJnTj3u0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
<p>The <strong>ESP32-DIV</strong> is a compact yet powerful device, built from two main sections: the <strong>Main Board</strong> and the <strong>Shield</strong>. Together, they enable Wi-Fi, BLE, 2.4GHz, and Sub-GHz operations. Below is a breakdown of the hardware components.</p>
<div class="markdown-heading">
<h2 class="heading-element"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6e0.png" alt="🛠" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Main Board</h2>
<p>&nbsp;</p>
</div>
<ul>
<li><strong>LF33</strong>: Voltage regulator providing a stable 3.3V supply for reliable operation.</li>
<li><strong>TP4056</strong>: Lithium battery charger with built-in protection for safe battery management.</li>
<li><strong>CP2102</strong>: USB-to-serial converter for flashing firmware and serial communication.</li>
<li><strong>PCF8574</strong>: I/O expander to manage multiple button inputs for user interaction.</li>
<li><strong>SD Card Slot</strong>: Stores captured signals, logs, and configurations.</li>
<li><strong>ESP32-U (16MB)</strong>: The core microcontroller with Wi-Fi and BLE capabilities, featuring 16MB flash memory.</li>
<li><strong>Antenna Connector</strong>: Supports external antennas for enhanced signal range.</li>
<li><strong>ILI9341 TFT Display</strong>: 2.8-inch screen for user interface and real-time data visualization.</li>
<li><strong>Push Buttons</strong>: For navigating menus and interacting with the device.</li>
</ul>
<div class="markdown-heading">
<h2 class="heading-element"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6e1.png" alt="🛡" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Shield</h2>
<p>&nbsp;</p>
</div>
<ul>
<li><strong>3 x NRF24 Modules</strong>: Enable 2.4GHz operations, including scanning, jamming, and protocol analysis.</li>
<li><strong>CC1101 Module</strong>: Sub-GHz transceiver for replay attacks, jamming, and signal capture.</li>
</ul>
<p><iframe title="ESP32-DIV: Your Swiss Army Knife for Wireless Networks" width="640" height="360" src="https://www.youtube.com/embed/jVp1zlcsrOY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>White Hacker Cyber Security Pro <span style="color: #0000ff;"><em><strong>Cifer</strong> </em></span>&#8221; ESP32-Div is a multi-featured wireless analysis device for WiFi, Bluetooth, 2.4 GHz, and sub-GHz signals. While ESP32-Div is not based on SDR technology, it is still an interesting device for wireless hackers to discuss.</p>
<p>ESP32-Div can monitor WiFi packets, spam fake WiFi access points, scan for deauth attacks, and scan nearby WiFi networks. For Bluetooth, it can jam, scan, spoof, and cause unintended behaviours on Apple devices via spoofing the AirDrop function. It can also be used as a general 2.4 GHz scanner and jammer. Finally, it can perform replay attacks and jam signals for sub-GHz signals.</p>
<p>The device consists of a custom PCB with an ESP32 and a built-in battery pack. A piggybacking shield adds 3x NRF24 modules for the 2.4 GHz features and a CC1101 module for the sub-GHz features.</p>
<p>Obviously, functions like jamming and spoofing are highly illegal in most countries, but it is interesting to see the capabilities available to anyone with these cheap chips and the right software. <a href="https://www.rtl-sdr.com/esp32-div-an-esp32-based-swiss-army-knife-for-wireless-networks/" target="_blank" rel="noopener">source</a></p>
<hr />
<h1 class="elementor-heading-title elementor-size-default">ESP32-DIV: Your Swiss Army Knife for Wireless Networks</h1>
<p>I’m Cifer, and after months of anticipation, I’m finally ready to introduce you to the ESP32DIV—an upgraded version of my original project that has been years in the making. If you’re excited about wireless tech, cybersecurity, and open-source hardware, then this is the project for you! Today, I’ll walk you through all the new features and the hardware behind this amazing device.</p>
<h3><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f525.png" alt="🔥" class="wp-smiley" style="height: 1em; max-height: 1em;" /> The ESP32DIV Evolution</h3>
<p>The ESP32DIV project originally started a few years ago. You all loved the first version, but compared to the new iteration, that one was like a “kindergarten project.” The new version is packed with upgrades and is much more powerful. While the old version only supported Wi-Fi and BLE, the ESP32DIV now has support for 2.4GHz and Sub-GHz frequencies, expanding its capabilities beyond what we originally imagined.</p>
<p>You might be wondering about the name—ESP32DIV. The “ESP32” part is obvious, but “DIV” comes from Persian mythology. In Persian culture, div refers to a supernatural being or demon—powerful and often associated with chaos and evil. It’s a fitting name for a tool that disrupts and manipulates wireless signals!</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-21117" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ESP32-DIV-Your-Swiss-Army-Knife-for-Wireless-Networks.jpg" alt="" width="828" height="466" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ESP32-DIV-Your-Swiss-Army-Knife-for-Wireless-Networks.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ESP32-DIV-Your-Swiss-Army-Knife-for-Wireless-Networks-400x225.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ESP32-DIV-Your-Swiss-Army-Knife-for-Wireless-Networks-768x432.jpg 768w" sizes="(max-width: 828px) 100vw, 828px" /></p>
<h3><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f310.png" alt="🌐" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Exploring the Features</h3>
<p>Let’s dive into the features that make the ESP32DIV so special. I’ve split the functionalities into several menus, each offering a unique set of tools for wireless manipulation and analysis.</p>
<h3><strong>Wi-Fi Menu:</strong></h3>
<p><strong>• Packet Monitor:</strong><br />
The Packet Monitor displays live traffic across all 14 Wi-Fi channels, visualized as a waterfall graph. This feature gives you real-time insight into what’s happening in your Wi-Fi environment.</p>
<p><strong>• Beacon Spammer:</strong><br />
This tool sends out fake Wi-Fi access points (beacon frames) to flood the airwaves. You can use it to disrupt connections, confuse nearby devices, or even trick users into connecting to fake networks. It offers two options: one that targets specific access points with custom names, and another that generates random fake networks.</p>
<p><strong>• Deauth Detector:</strong><br />
This feature scans for deauthentication attacks and other suspicious activity. Originally focused on detecting deauth attacks, it has evolved into a more general-purpose threat detection tool.</p>
<p><strong>• Wi-Fi Scanner:</strong><br />
The Wi-Fi Scanner provides a full list of nearby Wi-Fi networks along with detailed information about each one. It’s perfect for network analysis or security assessments.</p>
<p>&nbsp;</p>
<h3><strong>Bluetooth Menu:</strong></h3>
<p><strong>• BLE Jammer:</strong><br />
The BLE Jammer floods Bluetooth Low Energy (BLE) advertising channels with noise, making it harder for devices to discover or connect to each other. It also supports classic Bluetooth channels.</p>
<p><strong>• BLE Spoofer:</strong><br />
The BLE Spoofer mimics real BLE devices by sending fake advertising packets. You can impersonate specific devices and launch spoofing operations to test how other devices respond to fake signals.</p>
<p><strong>• Sour Apple:</strong><br />
Designed for Apple devices, the Sour Apple tool exploits BLE features like AirDrop and Continuity. It spoofs Apple BLE advertisements to trigger unintended behaviors or potentially cause data leaks.</p>
<p><strong>• BLE Scanner:</strong><br />
This tool scans for nearby BLE devices, even those normally hidden from your phone or laptop. You’ll receive detailed information on each device, making it great for analysis or security research.</p>
<h3><strong>2.4GHz Menu:</strong></h3>
<p><strong>• 2.4GHz Scanner:</strong><br />
This scans the entire 2.4GHz spectrum across 128 channels, enabling detection of a variety of wireless protocols—not just Wi-Fi and Bluetooth. It’s especially useful for spotting Zigbee networks or proprietary RF protocols operating in the same frequency range.</p>
<p><strong>• Protokill:</strong><br />
Protokill lets you jam different wireless protocols on the 2.4GHz band, including Zigbee and Wi-Fi. It’s perfect for stress testing protocols and conducting specific jamming operations.</p>
<p><strong>Sub-GHz Menu:</strong><br />
<strong>• </strong>Replay Attack:<br />
Capture a signal (such as a door unlock command) and replay it to gain unauthorized access. This tool allows you to store and replay captured signals, visualized with a real-time waterfall graph to help you better understand the process.</p>
<p><strong>• Sub-GHz Jammer:</strong><br />
This feature disrupts wireless communication in Sub-GHz frequencies, targeting devices like garage door openers, remote controls, and IoT sensors. You can select specific frequencies to jam or let the device automatically cycle through them.</p>
<p><strong>• Saved Profiles:</strong><br />
This section stores all captured signals from the Replay Attack feature, allowing you to revisit them, replay frequencies, or delete profiles as needed.</p>
<h3><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6e0.png" alt="🛠" class="wp-smiley" style="height: 1em; max-height: 1em;" /> The Hardware Behind ESP32DIV</h3>
<p>Now that you’ve seen the features, let’s take a look at the hardware. The ESP32DIV is made of two main sections: the Main Board and the Shield.</p>
<p><strong>Main Board:</strong></p>
<p><strong>• </strong>LF33: A voltage regulator providing a stable 3.3V supply.<br />
<strong>• </strong>TP4056: Lithium battery charger with protection.<br />
<strong>• </strong>CP2102: USB-to-serial converter for flashing and communication.<br />
<strong>• </strong>PCF8574: I/O expander for managing multiple button inputs.<br />
<strong>• </strong>SD Card Slot: For saving captured signals, logs, and configurations.<br />
<strong>• </strong>ESP32-U (16MB version): The core microcontroller with Wi-Fi and BLE.<br />
<strong>• </strong>Antenna Connector: For connecting external antennas.<br />
<strong>• </strong>ILI9341 TFT Display: A 2.8-inch screen for UI and live data.<br />
<strong>• </strong>Push Buttons: For menu navigation.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-21126" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_7956.00_09_14_18.Still013-1536x864-1.jpg" alt="" width="805" height="453" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_7956.00_09_14_18.Still013-1536x864-1.jpg 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_7956.00_09_14_18.Still013-1536x864-1-400x225.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_7956.00_09_14_18.Still013-1536x864-1-1024x576.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_7956.00_09_14_18.Still013-1536x864-1-768x432.jpg 768w" sizes="(max-width: 805px) 100vw, 805px" /></p>
<p>&nbsp;</p>
<p><strong>Shield:</strong><br />
<strong>• </strong>3 x NRF24 Modules: For 2.4GHz operations like jamming and attacks.</p>
<p><strong>• </strong>CC1101 Module: Su</p>
<hr />
<h1 class="elementor-heading-title elementor-size-default">ESP32-DIV: Your Swiss Army Knife for Wireless Networks</h1>
<p><iframe title="Your Swiss Army Knife for Wireless Networks" width="640" height="360" src="https://www.youtube.com/embed/bUvBjcczzcc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>In our increasingly connected world, where Wi-Fi networks are the backbone of our digital lives, there’s a growing need for tools that can help us understand, troubleshoot, and secure these networks. Imagine having a device that can not only monitor network traffic but also scan for nearby Wi-Fi networks, simulate beacon frames, and detect deauthentication attacks. Sounds intriguing, right? Well, you’re in luck because we’ve built just the gadget for you.</p>
<p><iframe title="&#x1f510; Sub-GHz Replay Attack in action with ESP32-DIV #cybersecurity #esp32 #gadgets" width="640" height="360" src="https://www.youtube.com/embed/jjO6Zj0ANJY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h3><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f31f.png" alt="🌟" class="wp-smiley" style="height: 1em; max-height: 1em;" /> About the Project</h3>
<p>Our creation is a versatile gadget that combines the power of the ESP32 microcontroller, the visual appeal of an ST7735 TFT LCD screen, and the convenience of microswitches for easy navigation. This multifaceted device is designed to assist network administrators, security enthusiasts, and IoT developers in understanding and managing wireless networks.</p>
<p>Let’s dive deeper into the features, the technology, and the journey of building this remarkable gadget.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-21119" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMG_2684-1024x683-1.jpg" alt="" width="820" height="547" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMG_2684-1024x683-1.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMG_2684-1024x683-1-400x267.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMG_2684-1024x683-1-768x512.jpg 768w" sizes="(max-width: 820px) 100vw, 820px" /></p>
<h3><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f3af.png" alt="🎯" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Features</h3>
<p>Our ESP32-based gadget boasts four main features, each catering to a specific aspect of wireless network management:</p>
<p><strong>• Packet Monitor</strong><br />
The Packet Monitor function allows you to capture and analyze network traffic in real-time. Whether you’re troubleshooting network issues or simply curious about the data flowing through the airwaves, this feature provides valuable insights.</p>
<p><strong>• Wi-Fi Analyzer</strong><br />
With the Wi-Fi Analyzer, you can scan the vicinity for available Wi-Fi networks. Discover SSIDs, signal strengths, and security protocols, all at the press of a button. It’s an indispensable tool for finding the best Wi-Fi connection.</p>
<p><strong>• Beacon Spam</strong><br />
Beacon Spamming is both intriguing and educational. It involves simulating beacon frames to broadcast information about a non-existent network. While not for malicious purposes, this function sheds light on the inner workings of Wi-Fi networks.</p>
<p><strong>• Deauth Detector</strong><br />
Network security is paramount, and the Deauth Detector function ensures you stay vigilant. It monitors for deauthentication packets, often a sign of an unauthorized intrusion. When detected, the gadget alerts you with both visual and audible cues.</p>
<p>Now that you’re familiar with what our gadget can do let’s get into the nitty-gritty of creating your very own wireless network Swiss Army knife.</p>
<h3><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f9f0.png" alt="🧰" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Getting Started</h3>
<p><strong>• TFT LCD ST7735</strong><br />
The ST7735 TFT LCD is the visual gateway to your gadget’s capabilities. Its vibrant display provides real-time feedback and enables user interaction. With a resolution of X by Y, it ensures that information is presented clearly and intuitively.</p>
<p><strong>• ESP32 Microcontroller</strong><br />
The ESP32 microcontroller is the brains behind the operation. Its built-in Wi-Fi and Bluetooth capabilities make it the ideal choice for this project. It handles the various functions, communicates with the TFT LCD, and manages user input through micro switches.</p>
<p><strong>• Micro Switches</strong><br />
Navigation is made easy thanks to the inclusion of micro switches. These tactile buttons allow users to move through menus, select functions, and interact with the gadget effortlessly.</p>
<h3 dir="auto" tabindex="-1"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f50c.png" alt="🔌" class="wp-smiley" style="height: 1em; max-height: 1em;" />Schematic</h3>
<p dir="auto" tabindex="-1">Before you begin assembling your gadget, it’s essential to understand the connections between the components. The table below outlines the connections between the ESP32, ST7735 TFT LCD, and micro switches:</p>
<p><strong>• ESP32 / st7735 TFT LCD</strong></p>
<table>
<thead>
<tr>
<th>Pin Name</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>14</td>
<td>CS</td>
</tr>
<tr>
<td>33</td>
<td>RST</td>
</tr>
<tr>
<td>27</td>
<td>DC</td>
</tr>
<tr>
<td>18</td>
<td>CLK</td>
</tr>
<tr>
<td>23</td>
<td>DIN</td>
</tr>
<tr>
<td>5V</td>
<td>VCC</td>
</tr>
<tr>
<td>3V3</td>
<td>LED</td>
</tr>
<tr>
<td>GND</td>
<td>GND</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p><strong>• ESP32 / Micro Switch</strong></p>
<table>
<thead>
<tr>
<th>Name</th>
<th>GPIO Pin</th>
</tr>
</thead>
<tbody>
<tr>
<td>Select</td>
<td>25</td>
</tr>
<tr>
<td>Up</td>
<td>21</td>
</tr>
<tr>
<td>Down</td>
<td>22</td>
</tr>
<tr>
<td>Back</td>
<td>26</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<h3 id="user-content-dart-features" dir="auto" tabindex="-1"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f3af.png" alt="🎯" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Core Functions</h3>
<p dir="auto" tabindex="-1">Now, let’s delve into the core functions of your gadget:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-21120" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274908_y-768x928-1.jpg" alt="" width="462" height="558" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274908_y-768x928-1.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274908_y-768x928-1-331x400.jpg 331w" sizes="(max-width: 462px) 100vw, 462px" /></p>
<p>&nbsp;</p>
<p><strong>• Packet Monitoring</strong><br />
the packet monitor allows you to receive the packets and surveillance the specific chosen channel. The Packet Monitoring function leverages the ESP32’s Wi-Fi capabilities to capture and analyze wireless packets. in promiscuous mode, enabling it to monitor all nearby Wi-Fi traffic. The information gathered is then displayed on the TFT LCD screen in real time.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-21122" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274909_y-739x1024-1.jpg" alt="" width="438" height="607" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274909_y-739x1024-1.jpg 739w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274909_y-739x1024-1-289x400.jpg 289w" sizes="(max-width: 438px) 100vw, 438px" /></p>
<p><strong>• Wi-Fi Scanning</strong><br />
The Wi-Fi Scanning function detects and lists nearby access points. You’ll utilize the ESP32’s scanning functions to retrieve information about SSIDs, signal strengths, channels and security protocols. This valuable data is presented to the user for network selection.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-21123" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5260253284902489871_y-768x947-1.jpg" alt="" width="458" height="565" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5260253284902489871_y-768x947-1.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5260253284902489871_y-768x947-1-324x400.jpg 324w" sizes="(max-width: 458px) 100vw, 458px" /></p>
<p><strong>• Beacon Spamming</strong><br />
in this section, by choosing the desired channel you can create and spam fake Wi-Fi access points. Beacon Spamming involves crafting and broadcasting fake beacon frames. This function is for educational purposes, allowing users to understand how networks announce their presence.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-21124" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274910_y-768x990-1.jpg" alt="" width="479" height="617" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274910_y-768x990-1.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274910_y-768x990-1-310x400.jpg 310w" sizes="(max-width: 479px) 100vw, 479px" /></p>
<p><strong>• Deauth Detection</strong><br />
Implement de-authentication detection by monitoring the network for deauth packets. all channels will be scanned for any de-authentication attack and will display the amount of detected packets for every channel. When detected, trigger the buzzer and LED to alert the user.</p>
<h2 dir="auto" tabindex="-1"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f440.png" alt="👀" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Use Cases</h2>
<p>Explore practical use cases for your gadget:</p>
<p><strong>Network Troubleshooting</strong>: Use the packet monitoring and Wi-Fi scanning functions to troubleshoot network issues, identify interference, and optimize Wi-Fi performance.</p>
<p><strong>Ethical Hacking Practice</strong>: Beacon spamming and deauth detection can be used for educational purposes in learning about network security and ethical hacking techniques.</p>
<p><strong>Security Audits</strong>: Offer your gadget as a tool for security professionals to perform security audits on wireless networks.</p>
<p><strong>IoT Projects</strong>: Extend the capabilities of your gadget by integrating it into IoT projects where wireless network monitoring is essential.</p>
<p><img loading="lazy" decoding="async" class="alignleft wp-image-5427" src="https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-150x150.png" sizes="(max-width: 30px) 100vw, 30px" srcset="https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-150x150.png 150w, https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-300x300.png 300w, https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-1022x1024.png 1022w, https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-768x770.png 768w, https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-1532x1536.png 1532w, https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-2043x2048.png 2043w, https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-500x500.png 500w, https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-750x750.png 750w" alt="" width="30" height="30" /></p>
<h2 dir="auto">Code</h2>
<p>If you’re interested in building this project on your own, the code is available on GitHub. Simply go to the GitHub repository, and download the code.</p>
<p><strong>GitHub repository</strong>: <a href="https://github.com/cifertech/ESP32-DIV">github.com/cifertech/ESP32-DIV</a></p>
<h2><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f64c.png" alt="🙌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Special Thanks to Our Sponsor: PCBWay</h2>
<p>No project is complete without the right tools and materials. That’s where our sponsor, <strong>PCBWay</strong>, stepped in to provide essential support for this project. PCBWay is a leading provider of high-quality printed circuit boards (PCBs) and PCB assembly services.</p>
<p><strong>Website</strong>: <a href="https://www.pcbway.com/" target="_new" rel="noopener">PCBWay Official Website</a></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21125" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_2629.MP4.00_00_01_17.Still001-1024x576-1.jpg" alt="" width="1024" height="576" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_2629.MP4.00_00_01_17.Still001-1024x576-1.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_2629.MP4.00_00_01_17.Still001-1024x576-1-400x225.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_2629.MP4.00_00_01_17.Still001-1024x576-1-768x432.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<h2 id="user-content-star2-about-the-project" dir="auto" tabindex="-1"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f31f.png" alt="🌟" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Conclusion</h2>
<p>In this blog, we embarked on an exciting journey to create a multifunctional gadget using the ESP32 microcontroller, a TFT LCD, and various other components. We explored the hardware components, designed a custom PCB, programmed the device to perform packet monitoring, Wi-Fi scanning, beacon spamming, and deauth detection, and discussed practical use cases.</p>
<p>The world of wireless network monitoring and security is vast, and our gadget can be a valuable tool for enthusiasts, professionals, and learners alike. By understanding the core functions and use cases, you’re well-equipped to build, use, and expand upon this versatile ESP32-based device.</p>
<p>As technology continues to evolve, having the ability to create custom gadgets that address specific needs becomes increasingly valuable. Whether you’re a tinkerer, a student, or a professional, the skills and knowledge gained from this project open doors to countless possibilities in the world of IoT and network security.</p>
<p>So, what’s next for your ESP32 gadget? Will you explore more functions, enhance the user interface, or find new and innovative ways to apply it in your projects? The choice is yours, and the journey is bound to be exciting and rewarding.<a href="https://cifertech.net/esp32-div-your-swiss-army-knife-for-wireless-networks/" target="_blank" rel="noopener">source</a></p>
<hr />
<h1 class="hckui__typography__h1">ESP32-DIV: Your Swiss Army Knife for Wireless Networks</h1>
<p class="hckui__typography__bodyL hckui__layout__marginBottom15">Imagine having a device that can not only monitor network traffic but also scan for nearby Wi-Fi networks, simulate beacon frames, and</p>
<p><iframe title="ESP32-DIV Deauther &#x1f4e1; #esp32 #gadgets #cybersecurity" width="640" height="360" src="https://www.youtube.com/embed/fTTjPQxpWMk?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<div class="markdown-heading"></div>
<blockquote class="instagram-media" style="background: #FFF; border: 0; border-radius: 3px; box-shadow: 0 0 1px 0 rgba(0,0,0,0.5),0 1px 10px 0 rgba(0,0,0,0.15); margin: 1px; max-width: 540px; min-width: 326px; padding: 0; width: calc(100% - 2px);" data-instgrm-captioned="" data-instgrm-permalink="https://www.instagram.com/reel/DI83DcJu6XR/?utm_source=ig_embed&amp;utm_campaign=loading" data-instgrm-version="14">
<div style="padding: 16px;">
<p>&nbsp;</p>
<div style="display: flex; flex-direction: row; align-items: center;">
<div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 40px; margin-right: 14px; width: 40px;"></div>
<div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center;">
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 100px;"></div>
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 60px;"></div>
</div>
</div>
<div style="padding: 19% 0;"></div>
<div style="display: block; height: 50px; margin: 0 auto 12px; width: 50px;"></div>
<div style="padding-top: 8px;">
<div style="color: #3897f0; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: 550; line-height: 18px;">View this post on Instagram</div>
</div>
<div style="padding: 12.5% 0;"></div>
<div style="display: flex; flex-direction: row; margin-bottom: 14px; align-items: center;">
<div>
<div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(0px) translateY(7px);"></div>
<div style="background-color: #f4f4f4; height: 12.5px; transform: rotate(-45deg) translateX(3px) translateY(1px); width: 12.5px; flex-grow: 0; margin-right: 14px; margin-left: 2px;"></div>
<div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(9px) translateY(-18px);"></div>
</div>
<div style="margin-left: 8px;">
<div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 20px; width: 20px;"></div>
<div style="width: 0; height: 0; border-top: 2px solid transparent; border-left: 6px solid #f4f4f4; border-bottom: 2px solid transparent; transform: translateX(16px) translateY(-4px) rotate(30deg);"></div>
</div>
<div style="margin-left: auto;">
<div style="width: 0px; border-top: 8px solid #F4F4F4; border-right: 8px solid transparent; transform: translateY(16px);"></div>
<div style="background-color: #f4f4f4; flex-grow: 0; height: 12px; width: 16px; transform: translateY(-4px);"></div>
<div style="width: 0; height: 0; border-top: 8px solid #F4F4F4; border-left: 8px solid transparent; transform: translateY(-4px) translateX(8px);"></div>
</div>
</div>
<div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center; margin-bottom: 24px;">
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 224px;"></div>
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 144px;"></div>
</div>
<p>&nbsp;</p>
<p style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; line-height: 17px; margin-bottom: 0; margin-top: 8px; overflow: hidden; padding: 8px 0 7px; text-align: center; text-overflow: ellipsis; white-space: nowrap;"><a style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: normal; line-height: 17px; text-decoration: none;" href="https://www.instagram.com/reel/DI83DcJu6XR/?utm_source=ig_embed&amp;utm_campaign=loading" target="_blank" rel="noopener">A post shared by Cifer (@cifertech)</a></p>
</div>
</blockquote>
<p><script async src="//www.instagram.com/embed.js"></script></p>
<blockquote class="instagram-media" style="background: #FFF; border: 0; border-radius: 3px; box-shadow: 0 0 1px 0 rgba(0,0,0,0.5),0 1px 10px 0 rgba(0,0,0,0.15); margin: 1px; max-width: 540px; min-width: 326px; padding: 0; width: calc(100% - 2px);" data-instgrm-captioned="" data-instgrm-permalink="https://www.instagram.com/reel/DJj6SwHuBzN/?utm_source=ig_embed&amp;utm_campaign=loading" data-instgrm-version="14">
<div style="padding: 16px;">
<p>&nbsp;</p>
<div style="display: flex; flex-direction: row; align-items: center;">
<div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 40px; margin-right: 14px; width: 40px;"></div>
<div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center;">
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 100px;"></div>
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 60px;"></div>
</div>
</div>
<div style="padding: 19% 0;"></div>
<div style="display: block; height: 50px; margin: 0 auto 12px; width: 50px;"></div>
<div style="padding-top: 8px;">
<div style="color: #3897f0; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: 550; line-height: 18px;">View this post on Instagram</div>
</div>
<div style="padding: 12.5% 0;"></div>
<div style="display: flex; flex-direction: row; margin-bottom: 14px; align-items: center;">
<div>
<div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(0px) translateY(7px);"></div>
<div style="background-color: #f4f4f4; height: 12.5px; transform: rotate(-45deg) translateX(3px) translateY(1px); width: 12.5px; flex-grow: 0; margin-right: 14px; margin-left: 2px;"></div>
<div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(9px) translateY(-18px);"></div>
</div>
<div style="margin-left: 8px;">
<div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 20px; width: 20px;"></div>
<div style="width: 0; height: 0; border-top: 2px solid transparent; border-left: 6px solid #f4f4f4; border-bottom: 2px solid transparent; transform: translateX(16px) translateY(-4px) rotate(30deg);"></div>
</div>
<div style="margin-left: auto;">
<div style="width: 0px; border-top: 8px solid #F4F4F4; border-right: 8px solid transparent; transform: translateY(16px);"></div>
<div style="background-color: #f4f4f4; flex-grow: 0; height: 12px; width: 16px; transform: translateY(-4px);"></div>
<div style="width: 0; height: 0; border-top: 8px solid #F4F4F4; border-left: 8px solid transparent; transform: translateY(-4px) translateX(8px);"></div>
</div>
</div>
<div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center; margin-bottom: 24px;">
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 224px;"></div>
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 144px;"></div>
</div>
<p>&nbsp;</p>
<p style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; line-height: 17px; margin-bottom: 0; margin-top: 8px; overflow: hidden; padding: 8px 0 7px; text-align: center; text-overflow: ellipsis; white-space: nowrap;"><a style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: normal; line-height: 17px; text-decoration: none;" href="https://www.instagram.com/reel/DJj6SwHuBzN/?utm_source=ig_embed&amp;utm_campaign=loading" target="_blank" rel="noopener">A post shared by Cifer (@cifertech)</a></p>
</div>
</blockquote>
<p><script async src="//www.instagram.com/embed.js"></script></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is a Wi-Fi Pineapple? How to Protect Yourself From Pineapple Attacks</title>
		<link>https://goodshepherdmedia.net/what-is-a-wi-fi-pineapple-how-to-protect-yourself-from-pineapple-attacks/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 14 Jul 2025 21:00:06 +0000</pubDate>
				<category><![CDATA[Computer Hacks]]></category>
		<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[how to defend from WiFi Pineapple]]></category>
		<category><![CDATA[how to protect your wifi]]></category>
		<category><![CDATA[How to Protect Yourself From Pineapple Attacks]]></category>
		<category><![CDATA[how to secure your wireless network]]></category>
		<category><![CDATA[how to stop a hacker]]></category>
		<category><![CDATA[Wi-Fi Pineapple]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21143</guid>

					<description><![CDATA[What is a Wi-Fi Pineapple? How to Protect Yourself From Pineapple Attacks Wi-Fi Pineapples trick you into connecting to fake networks, in an attempt to compromise your security and data. Protect yourself by avoiding public Wi-Fi, using VPNs, and watching for suspicious activity. Businesses should invest in secure Wi-Fi hardware, monitor their networks for unknown [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="article-header-title">What is a Wi-Fi Pineapple? How to Protect Yourself From Pineapple Attacks</h1>
<p><iframe title="How to Defend Against WiFi Attacks and WiFi Pineapples" width="640" height="360" src="https://www.youtube.com/embed/ZXuXIFeYdP4?list=PLW5y1tjAOzI2iSdHIGrOeb1-bNWB7TKMI" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<section class="emaki-custom-block emaki-custom-key-points" data-nosnippet="">
<div id="custom_block_0" class="emaki-custom key-points">
<div class="custom_block-content key-points">
<ul>
<li>Wi-Fi Pineapples trick you into connecting to fake networks, in an attempt to compromise your security and data.</li>
<li>Protect yourself by avoiding public Wi-Fi, using VPNs, and watching for suspicious activity.</li>
<li>Businesses should invest in secure Wi-Fi hardware, monitor their networks for unknown devices, and pay attention to what their IT department says.</li>
</ul>
</div>
</div>
</section>
<p>&#8220;Wi-Fi Pineapple&#8221; is a silly name for a real threat to your cybersecurity. These devices trick you into connecting to fake Wi-Fi networks to intercept data and compromise your privacy. Here&#8217;s how to protect against Pineapples and Wi-Fi attacks.</p>
<h2 id="what-is-a-wi-fi-pineapple">What Is a Wi-Fi Pineapple?</h2>
<p>A Wi-Fi Pineapple is a device ostensibly sold for Wi-Fi security auditing, that can also be used to perform real attacks on your devices.</p>
<p class="adsninja-injected-repeatable-ad-afterend">It&#8217;s not literally a pineapple (though I&#8217;m sure some enterprising hacker out there has at least attempted to house a Raspberry Pi in an actual pineapple fruit), but named because early devices resembled pineapples, with antennas sticking out at all angles much like pineapple leaves.</p>
<p>&#8220;Wi-Fi Pineapple&#8221; referred to a specific commercial device that automates man-in-the-middle attacks, but these attacks can also be performed with readily available off-the-shelf hardware, including laptops and single board computers.</p>
<div class="body-img landscape ">
<div class="responsive-img image-expandable img-article-item" data-img-url="https://static1.howtogeekimages.com/wordpress/wp-content/uploads/2025/05/52675364250_f1a7116783_o.jpg" data-modal-id="single-image-modal" data-modal-container-id="single-image-modal-container" data-img-caption="&quot;Corbin Davenport \/ How-To Geek&lt;br \/&gt;\n&lt;br \/&gt;\n&amp;nbsp;&quot;">
<figure><img loading="lazy" decoding="async" class="alignnone wp-image-21146" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/52675364250_f1a7116783_o.avif" alt="" width="524" height="294" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/52675364250_f1a7116783_o.avif 1650w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/52675364250_f1a7116783_o-400x224.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/52675364250_f1a7116783_o-1024x575.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/52675364250_f1a7116783_o-768x431.avif 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/52675364250_f1a7116783_o-1536x862.avif 1536w" sizes="(max-width: 524px) 100vw, 524px" /><figcaption class="body-img-caption"></figcaption>How Do Wi-Fi Attacks Work?</figure>
</div>
</div>
<p>There are two main types of attacks that use Wi-Fi networks: &#8220;evil twin&#8221; attacks impersonate known Wi-Fi networks, and trick your device into connecting to them, intercepting data and potentially giving remote access to your device. &#8220;Rogue AP (access point)&#8221; attacks advertise open networks in the hope that naive or internet-desperate users will connect, with the same outcomes.</p>
<p>Malicious Wi-Fi hotspots are set up in coffee shops, airports, and hotels in an attempt to get you to connect without any technical trickery. Often, simply naming the network something legitimate-sounding (like the name of the hotel) is enough to fool people into thinking it&#8217;s the real deal.</p>
<div class="body-img landscape ">
<div class="responsive-img image-expandable img-article-item" data-img-url="https://static1.howtogeekimages.com/wordpress/wp-content/uploads/2022/11/Joe-at-coffee-shop.jpg" data-modal-id="single-image-modal" data-modal-container-id="single-image-modal-container" data-img-caption="&quot;&lt;em&gt;Joe Fedewa \/ How-To Geek&lt;\/em&gt;&quot;">
<figure><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21145" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Joe-at-coffee-shop.avif" alt="" width="650" height="365" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Joe-at-coffee-shop.avif 650w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/Joe-at-coffee-shop-400x225.avif 400w" sizes="(max-width: 650px) 100vw, 650px" /></p>
<p class="adsninja-injected-repeatable-ad-beforebegin">For individuals, the primary threat of joining a malicious Wi-Fi network is the interception and recording of the data that is transmitted: emails, social network logins, and other sensitive information (including what websites you visit) can be recorded, and even if encrypted, there&#8217;s still the possibility that they can be exploited. Devices with improperly configured firewalls may also be remotely accessed via a compromised network, putting all the data on your device at risk.</p>
<p>For businesses, there is an additional threat: Wi-Fi Pineapples and other malicious devices can be inserted into networks (either using an unguarded Ethernet socket, or by capturing legitimate Wi-Fi credentials and cracking them), granting the attacker unfettered access to internal company infrastructure.</p>
<div class="ad-even"></div>
<h2 id="how-to-protect-yourself-from-pineapples">How To Protect Yourself From Pineapples</h2>
<p>The best way to protect yourself from a pineapple is to stay out of its way. Avoid public Wi-Fi if you can by tethering to your mobile phone to get online. If you do have to use public Wi-Fi, use a reputable VPN and set it up so that all internet traffic must go through it (known as a &#8220;kill switch&#8221; in some VPN interfaces). Travel routers are also great for this, allowing you to tether multiple devices or put multiple devices behind a VPN.</p>
<p class="adsninja-injected-repeatable-ad-beforebegin">While an actual Wi-Fi Pineapple device may be difficult to detect, there are additional measures you can take to protect yourself from fake hotspots and man-in-the-middle attacks in general. Before you connect to a network, check for duplicates or suspicious network names, and avoid scanning QR codes to connect unless they&#8217;re in a position they&#8217;re unlikely to have been tampered with. You can also disable auto-connect for public networks you&#8217;ve joined previously so that you don&#8217;t mistakenly reconnect to an impostor.</p>
<p>At home, make sure you change the default Wi-Fi network and administrator passwords and set up a guest network for visitors to use. A separate IoT network for your &#8220;smart&#8221; devices can also prevent them becoming a vector for network intruders. If you notice similar network names appearing in your neighborhood, consider changing the name of your own network so you don&#8217;t accidentally connect to someone else&#8217;s.</p>
<div id="b56b-4e7d-b914f2043dfd" class="display-card article article-card small no-badge active-content " data-include-community-rating="false" data-nosnippet="">
<div class="w-img ">
<div class="body-img landscape ">
<div class="responsive-img img-featured-4-pin-single-size-featured-secondary" data-img-url="https://static1.howtogeekimages.com/wordpress/wp-content/uploads/2024/06/a-phone-on-the-bluetooth-pairing-screen-and-the-bluetooth-icon-in-the-center.jpg" data-modal-id="single-image-modal" data-modal-container-id="single-image-modal-container" data-img-caption="&quot;&quot;">
<figure><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21144" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/a-phone-on-the-bluetooth-pairing-screen-and-the-bluetooth-icon-in-the-center.avif" alt="" width="844" height="536" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/a-phone-on-the-bluetooth-pairing-screen-and-the-bluetooth-icon-in-the-center.avif 844w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a-phone-on-the-bluetooth-pairing-screen-and-the-bluetooth-icon-in-the-center-400x254.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a-phone-on-the-bluetooth-pairing-screen-and-the-bluetooth-icon-in-the-center-768x488.avif 768w" sizes="(max-width: 844px) 100vw, 844px" /></figure>
</div>
</div>
</div>
</div>
</figure>
</div>
</div>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Generally, you should always heed SSL certificate warnings and unexpected redirects that may indicate your connection has been compromised. Never log into a website or app if you see one of these warnings. If you&#8217;re on public Wi-Fi, disconnect, and if you&#8217;re at home, start taking steps to diagnose and fix the issue(or call your local tech support). If a website login screen looks different to what you&#8217;re used to, you should also be suspicious that your traffic may be being re-routed to a fake site intended to steal your details.</p>
<h2 id="how-businesses-can-prevent-pineapple-attacks" class="adsninja-injected-repeatable-ad-beforebegin">How Businesses Can Prevent Pineapple Attacks</h2>
<p>If you run a business that provides Wi-Fi to staff or the public, it&#8217;s your responsibility to keep it secure. Give your IT team the time and resources they need to deploy, secure, and maintain infrastructure properly, or risk it falling out of date and being vulnerable to new attacks.</p>
<p>Your network should be regularly scanned for unauthorized devices and rogue Wi-Fi networks that may have been set up to trap employees or customers. If something suspicious is found, hunt down the rogue device (it might be hiding in a dusty corner under a couch in a café, for example) and remove it. Use enterprise-grade Wi-Fi hardware like Unifi that provides client isolation, management tools, and additional security features to make sure your network is under your control.</p>
<div class="ad-even"></div>
<h2 id="tips-for-staying-safe-in-a-dangerous-digital-world">Tips for Staying Safe in a Dangerous Digital World</h2>
<p>Antivirus and personal firewalls also play a key part in staying safe when connecting to public networks. If your device is compromised, they can help detect and block malicious software and activity so that you can secure your accounts and get your device fixed.</p>
<p>There&#8217;s also a laundry list of security tips and best practices you should follow to help prevent yourself becoming a victim of cybercrime. Following security advice can be inconvenient (especially when you really need to get online and you&#8217;re out of phone reception), but it&#8217;s worth it in the long run. <a href="https://www.howtogeek.com/what-is-a-wi-fi-pineapple-how-to-protect-yourself-from-pineapple-attacks/" target="_blank" rel="noopener">source</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Building a $23 Wi-Fi Pineapple in 6 Minutes ― EASIEST method!</title>
		<link>https://goodshepherdmedia.net/building-a-23-wi-fi-pineapple-in-6-minutes-%e2%80%95-easiest-method/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Sat, 12 Jul 2025 15:12:24 +0000</pubDate>
				<category><![CDATA[Computer Hacks]]></category>
		<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[DIY WiFi Pineapple]]></category>
		<category><![CDATA[how to defend from WiFi Pineapple]]></category>
		<category><![CDATA[WiFi Pineapple Definition]]></category>
		<category><![CDATA[WiFi Pineapple Uses]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21137</guid>

					<description><![CDATA[Building a $23 Wi-Fi Pineapple in 6 Minutes ― EASIEST method! &#160; WIFI Pineapple : DIY WIFI Pineapple Setup Guide Tp-Link Router with WIFI Pineapple Firmware I was just poking around for new projects and stumbled upon something cool. I’ve always had my eye on the Hak5 Wi-Fi Pineapple to build up my red teaming toolkit, but [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 id="post-title-t3_1hinq26" class="text-neutral-content-strong m-0 font-semibold text-18 xs:text-24 mb-xs px-md xs:px-0 xs:mb-md overflow-hidden" aria-label="Post Title: Building a $23 Wi-Fi Pineapple in 6 Minutes ― EASIEST method!" aria-describedby="feed-post-credit-bar-t3_1hinq26">Building a $23 Wi-Fi Pineapple in 6 Minutes ― EASIEST method!</h1>
<p><iframe title="Build a $23 Wi-Fi Pineapple in 6 Minutes — EASIEST Method! [Pt. I]" width="640" height="360" src="https://www.youtube.com/embed/udnxagkSzoA?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><iframe title="Upgrading the $23 Wi-Fi Pineapple for MAX Hackability! [Pt. II]" width="640" height="360" src="https://www.youtube.com/embed/pHtpso21P0o?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p><iframe title="Did you know you can make your own Wifi Pineapple for $30?" width="640" height="360" src="https://www.youtube.com/embed/-Zqan1CRIq0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h1 id="6b40" class="pw-post-title gu gv gw bf gx gy gz ha hb hc hd he hf hg hh hi hj hk hl hm hn ho hp hq hr hs ht hu hv hw bk" data-testid="storyTitle" data-selectable-paragraph="">WIFI Pineapple : DIY WIFI Pineapple Setup Guide</h1>
<figure class="mi mj mk ml mm mn mf mg paragraph-image">
<div class="mo mp fl mq bh mr" tabindex="0" role="button">
<div class="mf mg mh"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21153" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_bsSxIRNRttsr6l3zG6FhHA.jpg" alt="" width="1050" height="608" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_bsSxIRNRttsr6l3zG6FhHA.jpg 1050w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_bsSxIRNRttsr6l3zG6FhHA-400x232.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_bsSxIRNRttsr6l3zG6FhHA-1024x593.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_bsSxIRNRttsr6l3zG6FhHA-768x445.jpg 768w" sizes="(max-width: 1050px) 100vw, 1050px" /></div>
</div><figcaption class="mt ff mu mf mg mv mw bf b bg ab du" data-selectable-paragraph="">Tp-Link Router with WIFI Pineapple Firmware</figcaption></figure>
<p id="01c6" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph="">I was just poking around for new projects and stumbled upon something cool. I’ve always had my eye on the <a class="ag nv" href="https://shop.hak5.org/products/wifi-pineapple" target="_blank" rel="noopener ugc nofollow">Hak5 Wi-Fi Pineapple</a> to build up my red teaming toolkit, but I needed to stick to a budget. The Hak5 Wifi Pineapple is a powerful and versatile wireless penetration testing. It allows users to create rogue Wi-Fi networks, enabling them to intercept and analyze network traffic for security testing purposes. It could perform Evil Portal, MITM, DNS poisoning and many wireless attacks using web interface.</p>
<p id="fba1" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph="">After some initial research, I found that the Wifi Pineapple runs on OpenWrt. Also, I found this GitHub project by <a class="ag nv" href="https://github.com/xchwarze/wifi-pineapple-cloner-builds" target="_blank" rel="noopener ugc nofollow">Xchwarze</a> which talks about cloning the Wifi Pineapple.</p>
<h2 id="10e8" class="nw nx gw bf ny nz oa dy ob oc od ea oe ni of og oh nm oi oj ok nq ol om on oo bk" data-selectable-paragraph="">Here’s the outline of this project:</h2>
<ul class="">
<li id="678f" class="mx my gw mz b na op nc nd ne oq ng nh ni or nk nl nm os no np nq ot ns nt nu ou ov ow bk" data-selectable-paragraph="">Install <a class="ag nv" href="https://openwrt.org/releases/19.07/start" target="_blank" rel="noopener ugc nofollow">OpenWrt</a> firmware.</li>
<li id="ea37" class="mx my gw mz b na ox nc nd ne oy ng nh ni oz nk nl nm pa no np nq pb ns nt nu ou ov ow bk" data-selectable-paragraph="">Install the Pineapple firmware <a class="ag nv" href="https://github.com/xchwarze/wifi-pineapple-cloner-builds/blob/main/releases/archer-c7-v4-universal-sysupgrade.bin" target="_blank" rel="noopener ugc nofollow">upgrade file</a>.</li>
<li id="7709" class="mx my gw mz b na ox nc nd ne oy ng nh ni oz nk nl nm pa no np nq pb ns nt nu ou ov ow bk" data-selectable-paragraph="">Set up Wifi Pineapple.</li>
</ul>
<h2 id="9b8c" class="nw nx gw bf ny nz oa dy ob oc od ea oe ni of og oh nm oi oj ok nq ol om on oo bk" data-selectable-paragraph="">You’ll need the following essentials for this project:</h2>
<ol class="">
<li id="586c" class="mx my gw mz b na op nc nd ne oq ng nh ni or nk nl nm os no np nq ot ns nt nu pc ov ow bk" data-selectable-paragraph="">Any compatible router with OpenWRT (I’ll be using Tp-Link Archer C7).</li>
<li id="b291" class="mx my gw mz b na ox nc nd ne oy ng nh ni oz nk nl nm pa no np nq pb ns nt nu pc ov ow bk" data-selectable-paragraph="">A USB drive for installing modules.</li>
<li id="d374" class="mx my gw mz b na ox nc nd ne oy ng nh ni oz nk nl nm pa no np nq pb ns nt nu pc ov ow bk" data-selectable-paragraph="">OpenWrt 19.07.7.</li>
<li id="3c44" class="mx my gw mz b na ox nc nd ne oy ng nh ni oz nk nl nm pa no np nq pb ns nt nu pc ov ow bk" data-selectable-paragraph="">Wi-Fi Pineapple firmware.</li>
</ol>
<p id="d367" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph="">With these in hand, we’re ready to proceed with the setup process! So, let’s jump right into it!</p>
<p id="a4c2" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph=""><strong class="mz gx">Install OpenWrt firmware:</strong></p>
<p id="5dba" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph="">Download the OpenWrt firmware 19.07.7 using this <a class="ag nv" href="https://openwrt.org/releases/19.07/start" target="_blank" rel="noopener ugc nofollow">link</a>. Then, navigate to your default router login page and upgrade the firmware by simply uploading the OpenWrt router firmware file.</p>
<figure class="pe pf pg ph pi mn mf mg paragraph-image">
<div class="mo mp fl mq bh mr" tabindex="0" role="button">
<div class="mf mg pd"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21154" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_7bq3gk4eoCIOBChzB-bM8Q.webp" alt="" width="1100" height="529" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_7bq3gk4eoCIOBChzB-bM8Q.webp 1100w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_7bq3gk4eoCIOBChzB-bM8Q-400x192.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_7bq3gk4eoCIOBChzB-bM8Q-1024x492.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_7bq3gk4eoCIOBChzB-bM8Q-768x369.webp 768w" sizes="(max-width: 1100px) 100vw, 1100px" /></div>
</div>
</figure>
<p id="0ce3" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph="">It will take a few minutes for the router to reboot.<strong class="mz gx"> Do not restart or power off your router during this process, as it may brick your devic</strong>e. Once it’s flashed with OpenWrt, it’s time to upgrade to the Pineapple firmware.</p>
<p id="a355" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph=""><strong class="mz gx">Install the Pineapple firmware upgrade file:</strong></p>
<p id="3757" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph="">First, we need to download the Pineapple firmware upgrade file. Choose the appropriate router and download the firmware file from the <a class="ag nv" href="https://github.com/xchwarze/wifi-pineapple-cloner-builds" target="_blank" rel="noopener ugc nofollow">Github repo</a>. For my setup, I will be using the <a class="ag nv" href="https://github.com/xchwarze/wifi-pineapple-cloner-builds/blob/main/releases/archer-c7-v4-universal-sysupgrade.bin" target="_blank" rel="noopener ugc nofollow">Archer C7 v4 universal file</a>.</p>
<figure class="pe pf pg ph pi mn mf mg paragraph-image">
<div class="mo mp fl mq bh mr" tabindex="0" role="button">
<div class="mf mg pj"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21152" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_w_mqzb8KwgYQ5OR4PlxQzg.webp" alt="" width="1100" height="336" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_w_mqzb8KwgYQ5OR4PlxQzg.webp 1100w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_w_mqzb8KwgYQ5OR4PlxQzg-400x122.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_w_mqzb8KwgYQ5OR4PlxQzg-1024x313.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_w_mqzb8KwgYQ5OR4PlxQzg-768x235.webp 768w" sizes="(max-width: 1100px) 100vw, 1100px" /></div>
</div>
</figure>
<p id="5e06" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph="">Connect your device using an Ethernet port and open 192.168.1.1 in your browser. Navigate to the <em class="pk">System</em> tab and click on the <em class="pk">Flash Image</em> option. Choose the Flash Image and upload the Pineapple firmware sysupgrade file you recently downloaded. Uncheck the “<em class="pk">Keep settings and retain the current configuration</em>” box, then click <em class="pk">continue</em>. Again, this process should take a couple of minutes. Just a reminder: <strong class="mz gx">do not restart or power off your router</strong> during this time to avoid any interruptions in the firmware upgrade.</p>
<p id="4f1d" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph=""><strong class="mz gx">Setup Wifi Pineapple:</strong></p>
<p id="be88" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph="">Once the router restarts, connect it to the internet and browse to 172.16.42.1:1471 to setup your WIFI Pineapple. Congratulations, enjoy your newly configured Wifi Pineapple!”</p>
<figure class="pe pf pg ph pi mn mf mg paragraph-image">
<div class="mo mp fl mq bh mr" tabindex="0" role="button">
<div class="mf mg pl"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21151" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_1ONiqNm2KeUfYTZAl7ftpw.webp" alt="" width="1100" height="469" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_1ONiqNm2KeUfYTZAl7ftpw.webp 1100w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_1ONiqNm2KeUfYTZAl7ftpw-400x171.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_1ONiqNm2KeUfYTZAl7ftpw-1024x437.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_1ONiqNm2KeUfYTZAl7ftpw-768x327.webp 768w" sizes="(max-width: 1100px) 100vw, 1100px" /></div>
</div><figcaption class="mt ff mu mf mg mv mw bf b bg ab du" data-selectable-paragraph="">Wifi Pineapple Dashboard</figcaption></figure>
<p id="4bd9" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph="">Now that the Wifi Pineapple is set up, let’s proceed with installing modules to make it fully functional.</p>
<p id="729e" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph="">Plug the USB drive into the router and format it using the provided tool under <em class="pk">Advanced</em> &gt; <em class="pk">USB &amp; Storage</em> &gt;<em class="pk"> Format SD Card</em>. This step ensures your USB drive is ready to install the necessary modules for your Wifi Pineapple.</p>
<p id="b4e5" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph="">Simply click the <em class="pk">Get Modules</em> button and then click <em class="pk">Install</em> for the modules you would like to use. Be sure to install dependencies for each module once they are installed.</p>
<figure class="pe pf pg ph pi mn mf mg paragraph-image">
<div class="mo mp fl mq bh mr" tabindex="0" role="button">
<div class="mf mg pm"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21150" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_ozr7fRgP8tRPF8_kgznmeQ.webp" alt="" width="1100" height="542" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_ozr7fRgP8tRPF8_kgznmeQ.webp 1100w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_ozr7fRgP8tRPF8_kgznmeQ-400x197.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_ozr7fRgP8tRPF8_kgznmeQ-1024x505.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_ozr7fRgP8tRPF8_kgznmeQ-768x378.webp 768w" sizes="(max-width: 1100px) 100vw, 1100px" /></div>
</div><figcaption class="mt ff mu mf mg mv mw bf b bg ab du" data-selectable-paragraph="">Installing Modules</figcaption></figure>
<h2 id="5874" class="nw nx gw bf ny nz oa dy ob oc od ea oe ni of og oh nm oi oj ok nq ol om on oo bk" data-selectable-paragraph=""><strong class="am">Conclusion</strong></h2>
<p id="bb67" class="pw-post-body-paragraph mx my gw mz b na op nc nd ne oq ng nh ni or nk nl nm os no np nq ot ns nt nu gp bk" data-selectable-paragraph="">This is just a proof of concept to show that we can build a Wifi Pineapple on a budget, achieving similar functionality as the official one. Of course, I’d still suggest buying the <a class="ag nv" href="https://shop.hak5.org/products/wifi-pineapple" target="_blank" rel="noopener ugc nofollow">Hak5 WIFI Pineapple</a> to support the creators. I had a blast experimenting with my homemade version.</p>
<p id="ea61" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph="">I’m thinking of getting a compatible router like Gl.iNet, which is pocket-sized and can be powered by a power bank. This could come in handy, especially when traveling with a gigantic router is a hassle. Big thanks to <a class="ag nv" href="https://github.com/xchwarze/wifi-pineapple-cloner" target="_blank" rel="noopener ugc nofollow">Xchwarze</a> for sharing this project with the community. <a href="https://medium.com/@aleemS/wifi-pineapple-diy-wifi-pineapple-setup-guide-93fb12a97845" target="_blank" rel="noopener">source</a></p>
<hr />
<div class="jumbotron">
<h1 class="font-weight-light">DIY WiFi Pineapple</h1>
<h3 class="display-3">Introduction</h3>
<p class="lead">This guide will give you everything you need to build your own customizable wifi pineapple on a budget using the <a href="https://www.gl-inet.com/products/gl-ar150/">GL.iNet GL-AR150</a>. The guide includes step by step pictures, alternative analysis, power metrics, and more!</p>
<p>What is WiFi Pineapple?</p>
<ul>
<li>WiFi Pineapple is formally a product produced and sold by the company <a href="https://shop.hak5.org/products/wifi-pineapple" target="_blank" rel="noopener">Hak5</a></li>
<li>The device is used as a pentest tool and can be used as a rogue access point in both passive and active attacks.</li>
<li>Check out the official documentation for more information: <a href="https://wiki.wifipineapple.com/#!index.md" target="_blank" rel="noopener">https://wiki.wifipineapple.com</a></li>
</ul>
<p class="lead">This guide contains the following sections:</p>
<ol>
<li class="tallmargin"><b class="text-success">Comparing Pineapples</b> &#8211; Shows hardware differences of both products</li>
<li class="tallmargin"><b class="text-success">Materials Needed</b> &#8211; List of materials you need to build an AR150 WiFi Pineapple</li>
<li class="tallmargin"><b class="text-success">Flashing Pineapple Firmware</b> &#8211; Step by step guide to install the Pineapple firmware</li>
<li class="tallmargin"><b class="text-success">Hardware Modifications</b> &#8211; A guide to integrate the USB hub into the case of the AR150</li>
</ol>
<p class="lead">For additional resources on my website click the links below:</p>
<p><span style="color: #ff0000;"><strong>Comparing Pineapples</strong></span></p>
</div>
<div id="Comparing" class="jumbotron"><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21155" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/nano_vs_ar150_optimized.webp" alt="" width="900" height="400" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/nano_vs_ar150_optimized.webp 900w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/nano_vs_ar150_optimized-400x178.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/nano_vs_ar150_optimized-768x341.webp 768w" sizes="(max-width: 900px) 100vw, 900px" /></center></p>
<h3>Hardware Differences: <span class="text-success"><b>None</b></span></h3>
<table class="table table-hover">
<thead>
<tr>
<th scope="col"></th>
<th scope="col">Nano</th>
<th scope="col">AR150</th>
</tr>
</thead>
<tbody>
<tr>
<th scope="row">CPU</th>
<td>Atheros9331, 400MHz SoC</td>
<td>Atheros9331, 400MHz SoC</td>
</tr>
<tr>
<th scope="row">Memory</th>
<td>DDR2 64MB</td>
<td>DDR2 64MB</td>
</tr>
<tr>
<th scope="row">Storage</th>
<td>Flash 16MB</td>
<td>Flash 16MB</td>
</tr>
<tr>
<th scope="row">Wireless 1</th>
<td>Atheros AR9331 (IEEE 802.11 b/g/n)</td>
<td>Atheros AR9331 (IEEE 802.11 b/g/n)</td>
</tr>
<tr>
<th scope="row">Wireless 2</th>
<td>Atheros AR9271 (IEEE 802.11 b/g/n)</td>
<td>RT5370 USB WiFi Adapter (IEEE 802.11 b/g/n)</td>
</tr>
<tr>
<th scope="row">Price</th>
<td><span class="text-warning"><b>$100</b></span></td>
<td><span class="text-success"><b>$35</b></span></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
</div>
<div id="Materials" class="jumbotron">
<h1 class="display-3">Materials Needed</h1>
<div class="row align-items-center my-5">
<div class="col-lg-4"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21156" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/materials_optimized.webp" alt="" width="300" height="300" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/materials_optimized.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/materials_optimized-150x150.webp 150w" sizes="(max-width: 300px) 100vw, 300px" /></div>
<div class="col-lg-8">
<h1 class="font-weight-light">Basic <i><small class="text-muted">(Total $35)</small></i>:</h1>
<p>&nbsp;</p>
<ul class="list">
<li class="list-item">AR150 &#8211; $26 (<a href="https://www.amazon.com/dp/B01FJ4S9JK" target="_blank" rel="noopener">https://www.amazon.com/dp/B01FJ4S9JK</a>)</li>
<li class="list-item">RT5370 Wifi adapter &#8211; $6 (<a href="https://www.ebay.com/itm/282647848601" target="_blank" rel="noopener">https://www.ebay.com/itm/282647848601</a>)</li>
<li class="list-item">Flash Drive (1gb and up)</li>
<li class="list-item">USB 2.0 Hub (NOT 3.0)</li>
<li class="list-item">Power adapter or external battery (CURRENT)</li>
</ul>
<p>&nbsp;</p>
<h3 class="font-weight-light">Advanced Materials:</h3>
<p>&nbsp;</p>
<ul class="list">
<li class="list-item">USB Hub &#8211; $4 (<a href="https://www.ebay.com/itm/173995917456" target="_blank" rel="noopener">https://www.ebay.com/itm/173995917456</a>)</li>
<li class="list-item">Soldering Iron with fine &#8220;I&#8221; tip (<a href="https://www.amazon.com/dp/B07GTGGLXN" target="_blank" rel="noopener">https://www.amazon.com/dp/B07GTGGLXN</a>)</li>
<li class="list-item">Helping Hand (<a href="https://www.amazon.com/dp/B000P42O3C" target="_blank" rel="noopener">https://www.amazon.com/dp/B000P42O3C</a>)</li>
<li class="list-item">3D Printed Case Extension
<ul>
<li>Print: <a href="https://github.com/LinuxOperator/AR150-Case-Extension" target="_blank" rel="noopener">https://github.com/LinuxOperator/AR150-Case-Extension</a></li>
<li>Buy:</li>
</ul>
</li>
</ul>
<p>&nbsp;</p>
</div>
</div>
<p>&nbsp;</p>
</div>
<div id="Flashing" class="jumbotron">
<h1 class="display-3">Flash Pineapple Firmware</h1>
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21157" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150-and-box-scaled.webp" alt="" width="2560" height="1707" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150-and-box-scaled.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150-and-box-400x267.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150-and-box-1024x683.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150-and-box-768x512.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150-and-box-1536x1024.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150-and-box-2048x1365.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 1:</h4>
<p>Download the WiFi Pineapple firmware that was modified for the AR150: <span class="text-success">gl-ar150-nano-&lt;version&gt;-optimized.bin</span></p>
<h4>Step 2:</h4>
<p>Power on AR150 and connect a computer to the device&#8217;s LAN by one of the following:</p>
<ul>
<li>Connect an Ethernet cable to your computer from the &#8220;LAN&#8221; port</li>
<li>Connect to its WiFi network &#8220;GL-AR150-xxx&#8221; using the password &#8220;goodlife&#8221;</li>
</ul>
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21158" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_11.webp" alt="" width="2558" height="1178" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_11.webp 2558w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_11-400x184.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_11-1024x472.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_11-768x354.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_11-1536x707.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_11-2048x943.webp 2048w" sizes="(max-width: 2558px) 100vw, 2558px" /></center></p>
<h4>Step 3:</h4>
<p>Navigate to <a href="http://192.168.1.1/" target="_blank" rel="noopener">http://192.168.1.1</a> in a web browser and perform initial setup:</p>
<ul>
<li>Set Password (Note: this password will only be used once)</li>
</ul>
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21159" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_09.webp" alt="" width="2560" height="1174" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_09.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_09-400x183.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_09-1024x470.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_09-768x352.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_09-1536x704.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_09-2048x939.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 4:</h4>
<ul>
<li>From the admin panel click on &#8220;More Settings&#8221; then click &#8220;Advanced&#8221;</li>
</ul>
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21161" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_08.webp" alt="" width="2560" height="1174" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_08.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_08-400x183.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_08-1024x470.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_08-768x352.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_08-1536x704.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_08-2048x939.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 5:</h4>
<ul>
<li>Login with username &#8220;root&#8221; and your password created in step #2</li>
</ul>
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21160" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_07.webp" alt="" width="2560" height="1170" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_07.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_07-400x183.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_07-1024x468.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_07-768x351.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_07-1536x702.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_07-2048x936.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 6:</h4>
<ul>
<li>Click on &#8220;System&#8221; then on &#8220;Backup / Flash Firmware&#8221;</li>
</ul>
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21162" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_05.webp" alt="" width="2560" height="1178" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_05.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_05-400x184.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_05-1024x471.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_05-768x353.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_05-1536x707.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_05-2048x942.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 7:</h4>
<ul>
<li>Flash the optimized .bin file:
<ul>
<li>Under &#8220;Flash new firmware image&#8221; uncheck &#8220;Keep settings&#8221;</li>
<li>Choose File and select the .bin you downloaded in step 1</li>
<li>Click &#8220;Flash image&#8221;</li>
</ul>
</li>
</ul>
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21163" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_04.webp" alt="" width="2560" height="1172" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_04.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_04-400x183.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_04-1024x469.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_04-768x352.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_04-1536x703.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_04-2048x938.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 8:</h4>
<ul>
<li>Click &#8220;Proceed&#8221;</li>
</ul>
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21164" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_03.webp" alt="" width="2560" height="1180" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_03.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_03-400x184.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_03-1024x472.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_03-768x354.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_03-1536x708.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_03-2048x944.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 9:</h4>
<ul>
<li>Wait about 5min for the flash to complete.</li>
<li>Join the new network:
<ul>
<li>The device will now have a different Wifi SSID and IP address range.</li>
<li>Follow the guide bellow to connect to the pineapple over Wifi or LAN&#8230;</li>
</ul>
</li>
</ul>
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21165" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_02.webp" alt="" width="2560" height="1172" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_02.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_02-400x183.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_02-1024x469.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_02-768x352.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_02-1536x703.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_02-2048x938.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 10:</h4>
<h4 class="text-warning">If on <u>WiFi</u></h4>
<ul>
<li>Search for a network with &#8220;pineapple&#8221; in the name, connect to it</li>
<li>Change your computer&#8217;s IP address to &#8220;172.16.42.42&#8221;</li>
<li>Navigate to <a href="https://172.16.42.1:1471/" target="_blank" rel="noopener">https://172.16.42.1:1471</a> in your web browser</li>
<li>When you see the prompt for &#8220;Secure Setup&#8221;, <u>proceed by holding the reset button for ~5 seconds</u></li>
</ul>
<h4 class="text-warning">If on <u>Ethernet LAN</u></h4>
<ul>
<li>Change your computer&#8217;s IP address to &#8220;172.16.42.42&#8221;</li>
<li>Navigate to <a href="https://172.16.42.1:1471/" target="_blank" rel="noopener">https://172.16.42.1:1471</a> in your web browser</li>
<li>When you see the prompt for &#8220;Secure Setup&#8221;, proceed by quickly pressing the reset button (don&#8217;t hold it)</li>
</ul>
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21166" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_01.webp" alt="" width="2560" height="1174" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_01.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_01-400x183.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_01-1024x470.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_01-768x352.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_01-1536x704.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_01-2048x939.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 11:</h4>
<ul>
<li>Pineapple Configuration:
<ul>
<li>Root Password</li>
<li>Time Zone</li>
<li>other</li>
</ul>
</li>
</ul>
<p>&nbsp;</p>
</div>
<div id="Modifications" class="jumbotron">
<h1 class="display-3">Hardware Modifications</h1>
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21167" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_optimized-scaled.webp" alt="" width="2560" height="1707" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_optimized-scaled.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_optimized-400x267.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_optimized-1024x683.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_optimized-768x512.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_optimized-1536x1024.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_optimized-2048x1365.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21168" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150.gif" alt="" width="448" height="252" /></p>
<h4>Step 1:</h4>
<ul>
<li>Remove the back cover</li>
</ul>
<hr />
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21169" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_apart_optimized-scaled.webp" alt="" width="2560" height="1707" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_apart_optimized-scaled.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_apart_optimized-400x267.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_apart_optimized-1024x683.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_apart_optimized-768x512.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_apart_optimized-1536x1024.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_apart_optimized-2048x1365.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 2:</h4>
<ul>
<li>Dissasemble the USB Hub (A screwdriver and some prying should do the trick, don&#8217;t damage the female usb ports)</li>
</ul>
<hr />
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21170" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_more_optimized-scaled.webp" alt="" width="2560" height="1707" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_more_optimized-scaled.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_more_optimized-400x267.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_more_optimized-1024x683.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_more_optimized-768x512.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_more_optimized-1536x1024.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_more_optimized-2048x1365.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 3:</h4>
<ul>
<li>Note the order of the wires, the wires should go in this order onto the AR150 board</li>
</ul>
<hr />
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21171" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_soldered_optimized-scaled.webp" alt="" width="2560" height="1707" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_soldered_optimized-scaled.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_soldered_optimized-400x267.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_soldered_optimized-1024x683.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_soldered_optimized-768x512.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_soldered_optimized-1536x1024.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_soldered_optimized-2048x1365.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 4:</h4>
<ul>
<li>Solder the wires with a fine soldering tip (&#8220;I&#8221; is recommended)</li>
</ul>
<hr />
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21172" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/case_extension_optimized-scaled.webp" alt="" width="2560" height="1707" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/case_extension_optimized-scaled.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/case_extension_optimized-400x267.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/case_extension_optimized-1024x683.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/case_extension_optimized-768x512.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/case_extension_optimized-1536x1024.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/case_extension_optimized-2048x1365.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 5:</h4>
<ul>
<li>3D print the case extender using the following settings (or Buy: )</li>
<li>Plastic: PLA or PETG (ABS may shrink and cause model to not fit)</li>
<li>Layer Height:</li>
<li>Density: %</li>
</ul>
<hr />
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21173" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_glued_optimized-scaled.webp" alt="" width="2560" height="1707" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_glued_optimized-scaled.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_glued_optimized-400x267.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_glued_optimized-1024x683.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_glued_optimized-768x512.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_glued_optimized-1536x1024.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_glued_optimized-2048x1365.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 6:</h4>
<ul>
<li>Insert the USB hub and hot glue it in place for added support</li>
</ul>
<hr />
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21174" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_built_optimized-scaled.webp" alt="" width="2560" height="1707" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_built_optimized-scaled.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_built_optimized-400x267.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_built_optimized-1024x683.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_built_optimized-768x512.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_built_optimized-1536x1024.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_built_optimized-2048x1365.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 7:</h4>
<ul>
<li>Snap the pieces together making sure it is correctly aligned <a href="https://linuxoperator.com/guides/ar150/" target="_blank" rel="noopener">source</a></li>
</ul>
</div>
<p>&nbsp;</p>
<p>&nbsp;</p>
<hr />
<h2><span style="color: #ff0000;">HOW TO USE YOUR WIFI PINEAPPLE</span></h2>
<p><iframe title="How Hackers Use DNS Spoofing to Phish Passwords (WiFi Pineapple Demo)" width="640" height="360" src="https://www.youtube.com/embed/33H0ILk-yd8?list=PLW5y1tjAOzI2iSdHIGrOeb1-bNWB7TKMI" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<div class="ad-odd">
<p><iframe title="Create Rogue Networks on the WiFi Pineapple (PineAP KARMA Attacks)" width="640" height="360" src="https://www.youtube.com/embed/fOmDNn2aXXA?list=PLW5y1tjAOzI2iSdHIGrOeb1-bNWB7TKMI" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
<h3></h3>
<p>if you need a full sevice PCB manufacturer go here <a href="https://www.pcbway.com/" target="_blank" rel="noopener">PCBWay</a></p>
<p><span class="author flex-self-stretch"><a href="https://github.com/xchwarze/wifi-pineapple-cloner" target="_blank" rel="noopener">GitHub</a></span><span class="mx-1 flex-self-stretch color-fg-muted">/ </span><strong class="mr-2 flex-self-stretch"><a href="https://github.com/xchwarze/wifi-pineapple-cloner" target="_blank" rel="noopener" data-pjax="#repo-content-pjax-container" data-turbo-frame="repo-content-turbo-frame">wifi-pineapple-cloner</a></strong></p>
<p>by <span class="author flex-self-stretch"><a class="url fn" href="https://github.com/xchwarze" target="_blank" rel="author noopener" data-hovercard-type="user" data-hovercard-url="/users/xchwarze/hovercard" data-octo-click="hovercard-link-click" data-octo-dimensions="link_type:self" aria-keyshortcuts="Alt+ArrowUp">xchwarze</a></span></p>
<h2><strong><span style="color: #ff0000;">learn how to defend yourself below </span></strong></h2>
<blockquote class="wp-embedded-content" data-secret="ZK9TP04eMW"><p><a href="https://goodshepherdmedia.net/what-is-a-wi-fi-pineapple-how-to-protect-yourself-from-pineapple-attacks/">What is a Wi-Fi Pineapple? How to Protect Yourself From Pineapple Attacks</a></p></blockquote>
<p><iframe class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;What is a Wi-Fi Pineapple? How to Protect Yourself From Pineapple Attacks&#8221; &#8212; Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content" src="https://goodshepherdmedia.net/what-is-a-wi-fi-pineapple-how-to-protect-yourself-from-pineapple-attacks/embed/#?secret=bbgtP1PQCg#?secret=ZK9TP04eMW" data-secret="ZK9TP04eMW" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
<hr />
<h1 class="cmp-hero__title">WiFi Pineapple Definition &amp; Pineapple Router Uses</h1>
<div class="cmp-hero__text rte-content">
<p>Learn how Adaptive Multi-Factor Authentication combats data breaches, weak passwords, and phishing attacks.</p>
</div>
<p>A WiFi Pineapple is a small piece of equipment with a silly name and a lot of power. Some people use this tool for a legitimate security purpose. Others use it for hacking.</p>
<p>Whether you work in security or are concerned about the safety of your own data, it pays to know what a Pineapple router is. Chances are, you&#8217;ll encounter it at least once during your lifetime.</p>
<h2 data-anchor="anchor-subtitle-0">What Is a WiFi Pineapple?</h2>
<p>The size and shape of this device give the WiFi Pineapple its name. It&#8217;s a small, black device with several spikes. Developers thought it looked a bit like tropical fruit, so they named it accordingly.</p>
<p>The WiFi Pineapple was developed by Hak5, a private company. For <a href="https://shop.hak5.org/products/wifi-pineapple" target="_blank" rel="noopener noreferrer"><u>about $100</u><span class="cmp-link__screen-reader-only">opens in a new tab</span></a>, you can purchase one for yourself or your company. And you&#8217;re not required to disclose what you&#8217;d like to use it for.</p>
<p>Hak5 is known for creating testing tools. When the WiFi Pineapple was <a href="https://www.vice.com/en/article/pa39xv/pineapple-wifi-how-to-mitm-hack" target="_blank" rel="noopener noreferrer"><u>released in 2008</u><span class="cmp-link__screen-reader-only">opens in a new tab</span></a>, most people assumed testers would find it useful and everyone else would ignore it. The reality is a bit different.</p>
<h2 data-anchor="anchor-subtitle-1">How a WiFi Pineapple Works</h2>
<p>&lt; Open a WiFi channel on your computer, and the device will make a connection to an available router. A WiFi Pineapple is positioned between the device and the router, and with the proper programming, it can inspect all the data as it moves from one location to another.</p>
<p>Setting up a WiFi Pineapple isn&#8217;t always easy. Bloggers who detail their work create posts that take up <a href="https://www.troyhunt.com/the-beginners-guide-to-breaking-website/" target="_blank" rel="noopener noreferrer"><u>dozens of screens</u><span class="cmp-link__screen-reader-only">opens in a new tab</span></a>. But when the work is done, you&#8217;ll be able to look over all the traffic moving to and from a device and a WiFi router.</p>
<p>The device makes use of the underlying technology in any WiFi system. When you connect to a WiFi, your device remembers the service set identifier (SSI) of that router. When you&#8217;re in the same location, your device seeks out a router with the right SSI.</p>
<p>A WiFi Pineapple imitates the proper SSI, and that means anyone preprogrammed to connect will link with the Pineapple router instead.</p>
<h2 data-anchor="anchor-subtitle-2">Legitimate Uses of a Pineapple Router</h2>
<p>Computer security experts must understand how their systems work, where they are breaking, and why they might be vulnerable to an attack. A Pineapple WiFi router makes that work much easier.</p>
<p>During a penetration test (or pentest), experts attempt to hack a system, and they document their work for fixes and corrections. Typically, a pentest requires <a href="https://www.makeuseof.com/tag/wifi-pineapple-protect/" target="_blank" rel="noopener noreferrer"><u>specialized software and operating systems</u><span class="cmp-link__screen-reader-only">opens in a new tab</span></a>. But a WiFi Pineapple makes it really easy.</p>
<p>A security analyst might set up a Pineapple WiFi and then:</p>
<ul>
<li><b>Look for hookups. </b>Do people from your company attach to it automatically rather than using your authorized WiFi?</li>
<li><b>Watch for disclosures. </b>During a man-in-the-middle attack, a hacker watches all the data that passes between a device and a server. A WiFi Pineapple mimics this approach. How much would an attacker see?</li>
<li><b>Seek out access. </b>Can a hacker who sets up a man-in-the-middle attack gain further access to your system?</li>
<li><b>Watch for alarms. </b>Do your automated systems catch the intruder? How long does it take?</li>
</ul>
<p><a href="https://www.wifipineapple.com/pages/software" target="_blank" rel="noopener noreferrer"><u>WiFi Pineapple software</u><span class="cmp-link__screen-reader-only">opens in a new tab</span></a> makes monitoring easy. You&#8217;ll get email alerts throughout the simulated attack, and you can even tag interesting devices and follow them after they&#8217;ve been tapped by the program.</p>
<p>Someone using a WiFi Pineapple emerges with a significant amount of data about how the system works and what should be fixed.</p>
<h2 data-anchor="anchor-subtitle-3">Hackers Use Pineapple WiFi Too</h2>
<p>Just as security experts can launch man-in-the-middle attacks, so can hackers. The technology works in the same way.</p>
<p>A hacker might take over the SSI of a well-known WiFi router, such as one located inside of a college campus. An attack might look like this:</p>
<ul>
<li><b>Select victims. </b>Anyone who has attached to the server before is a target.</li>
<li><b>Set up the attack. </b>Using the WiFi Pineapple, the hacker spoofs the SSI of the intended server.</li>
<li><b>Connect. </b>A student comes within range of the spoofed router and connects.</li>
<li><b>Attack. </b>The hacker can now see everything that moves from the device to the server and back.</li>
</ul>
<p>A quick search brings up plenty of <a href="https://blog.sean-wright.com/man-in-the-middle-with-wifi-pineapple/" target="_blank" rel="noopener noreferrer"><u>step-by-step instructions</u><span class="cmp-link__screen-reader-only">opens in a new tab</span></a> hackers can follow to craft code. All they need are willing victims.</p>
<p>Unfortunately, many people are willing to connect with WiFi resources that seem free and readily available. They may push past security warnings and decline commonsense steps so they can hop online and complete their tasks.</p>
<p>A hacker even launched an attack like this <a href="https://www.csoonline.com/article/2462478/hacker-hunts-and-pwns-wifi-pineapples-with-0-day-at-def-con.html" target="_blank" rel="noopener noreferrer"><u>at a conference for hackers</u><span class="cmp-link__screen-reader-only">opens in a new tab</span></a>, proving that it&#8217;s almost irresistible for some people.</p>
<p>But some devices now come with sophisticated warning systems, and some don&#8217;t allow connections with devices that don&#8217;t seem secure or legitimate. Some hackers believe the <a href="https://www.reddit.com/r/AskNetsec/comments/70h5ec/is_wifi_pineapple_still_worth_the_price/" target="_blank" rel="noopener noreferrer"><u>WiFi Pineapple heyday is over</u><span class="cmp-link__screen-reader-only">opens in a new tab</span></a>, as taking control is more difficult now than it once was.</p>
<p>But if a hacker can execute an attack like this, they can gain access to critical information, such as these:</p>
<ul>
<li>Social Security numbers</li>
<li>Photographs</li>
<li>Bank account numbers</li>
<li>Passwords</li>
</ul>
<h2 data-anchor="anchor-subtitle-4">Protecting Against Wireless Pineapple Attacks</h2>
<p>Hackers are clever, and they use all sorts of tips and tricks to gain access into assets they have no business touching.</p>
<p>Commonsense protection steps involve:</p>
<ul>
<li><b>Avoiding public WiFi. </b>Don&#8217;t connect to any device you don&#8217;t own. Rely on your cell service instead.</li>
<li><b>Turning off WiFi when you leave your house. </b>Don&#8217;t allow your device to scan for SSIDs as you move from location to location. Snap off the functionality when you&#8217;re on the go.</li>
<li><b>Leaning on a VPN. </b><a href="https://www.androidheadlines.com/2019/08/what-is-a-wifi-pineapple-and-can-it-compromise-your-security.html" target="_blank" rel="noopener noreferrer"><u>Virtual private networks</u><span class="cmp-link__screen-reader-only">opens in a new tab</span></a> (or VPNs) encrypt your data as it moves through the internet. Even if you&#8217;re connected via a WiFi Pineapple, your data will be protected.</li>
</ul>
<p>We can help too. Contact us to learn how Okta can help keep your data and users safe from network attacks and vulnerabilities.  <a href="https://www.okta.com/identity-101/wifi-pineapple/" target="_blank" rel="noopener">source</a></p>
<h3></h3>
<h3></h3>
<h3></h3>
<h3></h3>
<h3></h3>
<h3></h3>
<h3></h3>
<h3></h3>
<h3></h3>
<h3>in case the youtube videos are deleted here they are</h3>
<p>&nbsp;</p>
<div style="width: 640px;" class="wp-video"><video class="wp-video-shortcode" id="video-21137-1" width="640" height="360" preload="metadata" controls="controls"><source type="video/mp4" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Build-a-23-Wi-Fi-Pineapple-in-6-Minutes-—-EASIEST-Method-pt-1.mp4?_=1" /><a href="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Build-a-23-Wi-Fi-Pineapple-in-6-Minutes-—-EASIEST-Method-pt-1.mp4">https://goodshepherdmedia.net/wp-content/uploads/2025/07/Build-a-23-Wi-Fi-Pineapple-in-6-Minutes-—-EASIEST-Method-pt-1.mp4</a></video></div>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div style="width: 640px;" class="wp-video"><video class="wp-video-shortcode" id="video-21137-2" width="640" height="360" preload="metadata" controls="controls"><source type="video/mp4" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Upgrading-the-23-Wi-Fi-Pineapple-for-MAX-Hackability-part-2.mp4?_=2" /><a href="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Upgrading-the-23-Wi-Fi-Pineapple-for-MAX-Hackability-part-2.mp4">https://goodshepherdmedia.net/wp-content/uploads/2025/07/Upgrading-the-23-Wi-Fi-Pineapple-for-MAX-Hackability-part-2.mp4</a></video></div>
<div style="width: 640px;" class="wp-video"><video class="wp-video-shortcode" id="video-21137-3" width="640" height="360" preload="metadata" controls="controls"><source type="video/mp4" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/How-Hackers-Use-DNS-Spoofing-to-Phish-Passwords-WiFi-Pineapple-Demo.mp4?_=3" /><a href="https://goodshepherdmedia.net/wp-content/uploads/2025/07/How-Hackers-Use-DNS-Spoofing-to-Phish-Passwords-WiFi-Pineapple-Demo.mp4">https://goodshepherdmedia.net/wp-content/uploads/2025/07/How-Hackers-Use-DNS-Spoofing-to-Phish-Passwords-WiFi-Pineapple-Demo.mp4</a></video></div>
<div style="width: 640px;" class="wp-video"><video class="wp-video-shortcode" id="video-21137-4" width="640" height="360" preload="metadata" controls="controls"><source type="video/mp4" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Did-you-know-you-can-make-your-own-Wifi-Pineapple-for-30_.mp4?_=4" /><a href="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Did-you-know-you-can-make-your-own-Wifi-Pineapple-for-30_.mp4">https://goodshepherdmedia.net/wp-content/uploads/2025/07/Did-you-know-you-can-make-your-own-Wifi-Pineapple-for-30_.mp4</a></video></div>
]]></content:encoded>
					
		
		<enclosure url="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Build-a-23-Wi-Fi-Pineapple-in-6-Minutes-—-EASIEST-Method-pt-1.mp4" length="0" type="video/mp4" />
<enclosure url="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Upgrading-the-23-Wi-Fi-Pineapple-for-MAX-Hackability-part-2.mp4" length="0" type="video/mp4" />
<enclosure url="https://goodshepherdmedia.net/wp-content/uploads/2025/07/How-Hackers-Use-DNS-Spoofing-to-Phish-Passwords-WiFi-Pineapple-Demo.mp4" length="0" type="video/mp4" />
<enclosure url="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Did-you-know-you-can-make-your-own-Wifi-Pineapple-for-30_.mp4" length="0" type="video/mp4" />

			</item>
		<item>
		<title>ESP32 Marauder Puts a Bluetooth and Wi-Fi Pen Testing Toolkit In Your Pocket</title>
		<link>https://goodshepherdmedia.net/esp32-marauder-puts-a-bluetooth-and-wi-fi-pen-testing-toolkit-in-your-pocket/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 23 Jun 2025 17:45:57 +0000</pubDate>
				<category><![CDATA[Adult Fun]]></category>
		<category><![CDATA[Computer Hacks]]></category>
		<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Electronic Projects]]></category>
		<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[Home Defense / Safety]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Science & Engineering]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[📱Mobile📱]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[🛜🌐💻⌨ Pen Test Tools]]></category>
		<category><![CDATA[🛜🌐💻⌨ Wireless Pen Test]]></category>
		<category><![CDATA[bluetooth hacking]]></category>
		<category><![CDATA[ESP32]]></category>
		<category><![CDATA[ESP32 Marauder]]></category>
		<category><![CDATA[ESP32 Marauder Kit Assembly and Programming Guide]]></category>
		<category><![CDATA[hack wifi]]></category>
		<category><![CDATA[Marauder]]></category>
		<category><![CDATA[pen test bluetooth]]></category>
		<category><![CDATA[pen test wifi]]></category>
		<category><![CDATA[pen testing]]></category>
		<category><![CDATA[Securing Bluetooth]]></category>
		<category><![CDATA[Securing Wifi]]></category>
		<category><![CDATA[Wi-Fi Pen Testing Toolkit]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=20940</guid>

					<description><![CDATA[ESP32 Marauder Puts a Bluetooth and Wi-Fi Pen Testing Toolkit In Your Pocket Justcallmekoko&#8217;s compact open source design takes aim at wireless penetration testing and signal analysis. UPDATE: justcallmekoko has launched a new iteration of the Marauder (v6) for $60, which includes a sleeker look, options for external antennas, and the ability to update its firmware over Wi-Fi [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="shopify-section-sections--17660780183732__header" class="shopify-section shopify-section-group-header-group section-header scrolled-past-header shopify-section-header-hidden shopify-section-header-sticky">
<header class="header header--middle-left header--mobile-center page-width header--has-menu header--has-social header--has-account header--has-localizations">
<div class="header__icons header__icons--localization header-localization">
<div class="desktop-localization-wrapper">
<form id="HeaderCountryForm" class="localization-form" accept-charset="UTF-8" action="https://biscuitshop.us/localization" enctype="multipart/form-data" method="post">
<div>
<h1 class="hckui__typography__h1Responsive hckui__typography__breakWord">ESP32 Marauder Puts a Bluetooth and Wi-Fi Pen Testing Toolkit In Your Pocket</h1>
<h2 class="hckui__typography__h3 hckui__typography__fontWeightNormal hckui__typography__pebble hckui__layout__marginTop15">Justcallmekoko&#8217;s compact open source design takes aim at wireless penetration testing and signal analysis.</h2>
<p><iframe title="ESP32 Marauder" width="640" height="360" src="https://www.youtube.com/embed/gaTFkM--mrg?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2 class="hckui__typography__h3 hckui__typography__fontWeightNormal hckui__typography__pebble hckui__layout__marginTop15"><img loading="lazy" decoding="async" class="alignnone wp-image-20945" style="font-size: 16px;" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/2020-06-03t21-36-22-1_343z-img_0421_m104cBpjD4.avif" alt="" width="740" height="416" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/2020-06-03t21-36-22-1_343z-img_0421_m104cBpjD4.avif 1245w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/2020-06-03t21-36-22-1_343z-img_0421_m104cBpjD4-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/2020-06-03t21-36-22-1_343z-img_0421_m104cBpjD4-1024x576.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/2020-06-03t21-36-22-1_343z-img_0421_m104cBpjD4-768x432.avif 768w" sizes="(max-width: 740px) 100vw, 740px" /></h2>
</div>
</form>
</div>
</div>
</header>
<div>
<div id="article_page_simple_ad_portal"></div>
<div class="hckui__layout__flex hckui__layout__marginTop30">
<div class="hckui__layout__flex hckui__layout__flex1">
<div id="articleStickySidebar" class="hckui__util__posRelative hckui__layout__marginRight30 hckui__layout__hiddenMedDown sticky_actions__zIndex10__X1gBe">
<div></div>
<div class="sticky_actions__stickyButton__vVglk"></div>
<div></div>
</div>
</div>
<div class="article_layout__body__fN0GB">
<section>
<div class="article_layout__content__LHCyf project-story hljs-monokai">
<p class="hckui__typography__bodyL"><strong>UPDATE:</strong> justcallmekoko has <a class="hckui__typography__linkBlue" href="https://www.tindie.com/products/justcallmekoko/esp32-marauder-v6/" rel="nofollow">launched a new iteration</a> of the Marauder (v6) for $60, which includes a sleeker look, options for external antennas, and the ability to update its firmware over Wi-Fi and/or SD card.</p>
<div>
<div class="image_carousel__container__hGUHe undefined">
<div class="image_carousel__wrapper__qcLYl lazy_image__fade__47am3 lazy_image__fadeIn__KwFYU" data-intersect-callback-id="cbe451ce-6e87-43e1-8b13-cfb4cb70608d">
<div class="hckui__layout__noScrollBar image_carousel__scrollContainer__c2Pc1 ">
<div class="image_carousel__imageContainer__D2V9v">
<div class="image_carousel__imageWrapper__BpzDn"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20946" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/2020-06-03t21-36-22-1_343z-img_0426_VoVLQOYNWI.avif" alt="" width="740" height="493" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/2020-06-03t21-36-22-1_343z-img_0426_VoVLQOYNWI.avif 740w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/2020-06-03t21-36-22-1_343z-img_0426_VoVLQOYNWI-400x266.avif 400w" sizes="(max-width: 740px) 100vw, 740px" /></div>
</div>
</div>
</div>
</div>
<div></div>
</div>
<p class="hckui__typography__bodyL"><em>The original article continues below.</em></p>
<p class="hckui__typography__bodyL">Penetration testers and security analysts looking for an easily-pocketable tool for Bluetooth and Wi-Fi testing purposes have another option, in the form of the ESP32 Marauder from security tester justcallmekoko.</p>
<p class="hckui__typography__bodyL">&#8220;The Marauder is a portable penetration testing tool created for Wi-Fi and Bluetooth analysis,&#8221; the pseudonymous justcallmekoko explains. &#8220;It comes installed with a suite of offensive and defensive tools all running on an ESP32. I was inspired to create this tool by Spacehuhn&#8217;s deauther project. I wanted to bring similar functionality to the ESP32 and introduce new Bluetooth capabilities to the tool.&#8221;</p>
<p><iframe title="ESP32 Marauder: Wifi and Bluetooth Hacking Tool" width="640" height="360" src="https://www.youtube.com/embed/BGFO1wA29o8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p class="hckui__typography__bodyL">&#8220;The tool itself serves as a portable device used to test and analyze Wi-Fi and Bluetooth devices. Use this tool and its firmware with caution as the use of some of its capabilities without explicit consent from the target owner is unlawful in most countries.&#8221;</p>
<p class="hckui__typography__bodyL">The firmware justcallmekoko has created is compatible with any ESP32-based development board, and designed to provide feedback via a 2.8&#8243; ILI9341-based TFT touchscreen display. The pre-assembled versions take the firmware and install it onto a custom PCB with Espressif ESP32-WROOM chip at its heart and an integrated lithium-polymer charging circuit for power on the go.</p>
<div>
<div class="image_carousel__container__hGUHe undefined">
<div class="image_carousel__wrapper__qcLYl lazy_image__fade__47am3 lazy_image__fadeIn__KwFYU" data-intersect-callback-id="dca6131d-8c47-4d38-8aec-1195520d5469">
<div class="hckui__layout__noScrollBar image_carousel__scrollContainer__c2Pc1 ">
<div class="image_carousel__imageContainer__D2V9v">
<div class="image_carousel__imageWrapper__BpzDn"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20947" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/image_0uXwDRPGxg.avif" alt="" width="740" height="493" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/image_0uXwDRPGxg.avif 740w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/image_0uXwDRPGxg-400x266.avif 400w" sizes="(max-width: 740px) 100vw, 740px" /></div>
</div>
</div>
</div>
<div class="image_carousel__caption__nRb8S">The custom PCB is powered by an ESP32-WROOM. (<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4f7.png" alt="📷" class="wp-smiley" style="height: 1em; max-height: 1em;" />: justcallmekoko)</div>
</div>
<div></div>
</div>
<p class="hckui__typography__bodyL">The entire unit is then enclosed in a 3D-printed chassis, which in the case of the pre-assembled version comes in a selection of colors: black, &#8220;Galaxy Black,&#8221; neon green, and silver. Justcallmekoko warns, however, that &#8220;most of the work so far has been put into designing the hardware,&#8221; meaning that the current release has &#8220;limited firmware capabilities&#8221; — but that development is ongoing to add new features and functionality.</p>
<p class="hckui__typography__bodyL">More details on the project can be found on <a class="hckui__typography__linkBlue" href="https://github.com/justcallmekoko/ESP32Marauder/" target="_blank" rel="nofollow noopener">GitHub</a>, where the firmware, hardware, and 3D print files can be downloaded; the pre-assembled ESP32 Marauder, meanwhile, can be <a class="hckui__typography__linkBlue" href="https://www.tindie.com/products/justcallmekoko/esp32-marauder/" target="_blank" rel="nofollow noopener">purchased from Tindie</a>. <a href="https://www.hackster.io/news/esp32-marauder-puts-a-bluetooth-and-wi-fi-pen-testing-toolkit-in-your-pocket-32d389f6e66f" target="_blank" rel="noopener">source</a></p>
</div>
</section>
</div>
</div>
</div>
</div>
<p>&nbsp;</p>
<section id="shopify-section-template--17660780740788__main" class="shopify-section section">
<div class="page-width page-width--narrow section-template--17660780740788__main-padding">
<div class="rte scroll-trigger animate--slide-in">
<div class="container">
<hr />
<h1 class="terminal-typed">ESP32 Marauder Kit Assembly and Programming Guide</h1>
<p>Thank you for purchasing the ESP32 Marauder Kit! Let&#8217;s get started with assembling and programming your device.</p>
<p><iframe title="New ESP32 MARAUDER v7!  A Penetration Tester&#039;s DREAM!!" width="640" height="360" src="https://www.youtube.com/embed/qbmrIkyX__k?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2 class="terminal-typed">Things You&#8217;ll Need</h2>
<ul>
<li>A computer with <a title="Google Chrome" href="https://www.google.com/chrome/" target="_blank" rel="noopener">Google Chrome</a></li>
<li>A 3 mm Allen Wrench</li>
<li>An ESP32 Marauder Kit</li>
</ul>
<h2 class="terminal-typed">Programming the Device</h2>
<ol>
<li style="list-style-type: none;">
<ol>
<li>First lets program the device as the buttons are not accessible while assembled. Go to :<br />
<strong><a title="Marauder Online Flasher" href="https://flasher.biscuitshop.us/" target="_blank" rel="noopener">Marauder Online Flasher</a></strong> (https://flasher.biscuitshop.us)</li>
<li>Hold the BOOT button (bottom one) on the back of the Marauder while plugging it into your computer. The screen should stay black if done correctly.</li>
<li>Click the connect button on the website and select the COM port associated with your device. If you have multiple COM ports, unplug the device, see which port disappears, then repeat step two and connect to the correct port.</li>
</ol>
</li>
</ol>
<p><img loading="lazy" decoding="async" class="" src="https://cdn.shopify.com/s/files/1/0635/4059/2820/files/Flash1.png?v=1721276127" alt="Connect the Device" width="1111" height="581" /></p>
</div>
<div class="container">
<p><img loading="lazy" decoding="async" class="alignnone wp-image-20944" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash1.webp" alt="" width="1111" height="581" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash1.webp 2527w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash1-400x209.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash1-1024x536.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash1-768x402.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash1-1536x804.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash1-2048x1071.webp 2048w" sizes="(max-width: 1111px) 100vw, 1111px" /></p>
<ol>
<li style="list-style-type: none;">
<ol>
<li>Click the dropdown menu and select <strong>CYD2USB w/o GPS. Do not choose the one shown in the pic (Unless you purchased from me early on and your device does not have USB-C), I have started using the new models for all orders going forward.</strong></li>
</ol>
</li>
</ol>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-20943" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash2-scaled.webp" alt="" width="1111" height="492" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash2-scaled.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash2-400x177.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash2-1024x453.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash2-768x340.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash2-1536x680.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash2-2048x907.webp 2048w" sizes="(max-width: 1111px) 100vw, 1111px" /></p>
<ol>
<li style="list-style-type: none;">
<ol>
<li>Click the latest version 2.8 inch &#8211; (1.0.0) and click the program button. Allow it to finish without switching windows.</li>
</ol>
</li>
</ol>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-20942" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash3.webp" alt="" width="1111" height="491" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash3.webp 2556w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash3-400x177.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash3-1024x452.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash3-768x339.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash3-1536x678.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash3-2048x904.webp 2048w" sizes="(max-width: 1111px) 100vw, 1111px" /></p>
<ol>
<li>Once programming is complete, the display will stay black. Power cycle the device, and it should boot into the Marauder firmware.</li>
</ol>
<p>This same process can be used to update your device as new releases come out. As of July 15, 2024, Version 1.0.0 has just been released.</p>
<h2 class="terminal-typed">Assembling the Device</h2>
<div class="toggle-container"><strong><span class="toggle-label">Switch to Battery-Powered Instructions</span></strong></div>
<div id="standardAssembly">
<ol>
<li>Take the bottom part of the case and place the ESP32 Marauder PCB into it.</li>
<li>Install the top cover and use the 4 provided screws to fasten it to the bottom half.</li>
</ol>
</div>
</div>
</div>
</div>
</section>
<p><a href="https://biscuitshop.us/pages/esp32-marauder-instructions?srsltid=AfmBOopNsca-dtlVK6EXx_Cs2nWLXZgaA51ItiAJ8iOzLKFFOrfT0wf_" target="_blank" rel="noopener">source</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Install Node-Red to Home Assistant &#8211; Using Node-Red for Complex Home Automations</title>
		<link>https://goodshepherdmedia.net/complex-home-automation-with-node-red-and-home-assistant/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Thu, 12 Jun 2025 08:57:22 +0000</pubDate>
				<category><![CDATA[Computer Hacks]]></category>
		<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Electronic Projects]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[Home Automation]]></category>
		<category><![CDATA[Home Computing]]></category>
		<category><![CDATA[Home Defense / Safety]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Raspberry Pi]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[Complex Home Automation]]></category>
		<category><![CDATA[Complex Home Automations]]></category>
		<category><![CDATA[Home Assistant]]></category>
		<category><![CDATA[Home Assistant with Node-Red]]></category>
		<category><![CDATA[How to Install Node-Red]]></category>
		<category><![CDATA[Node-Red]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=20775</guid>

					<description><![CDATA[How to Install Node-Red to Home Assistant &#8211; Using Node-Red for Complex Home Automations Node-RED is a flow-based, low-code development tool for visual programming, originally developed by IBM for wiring together hardware devices, APIs and online services as part of the Internet of things. Node-RED provides a web browser-based flow editor, which can be used [&#8230;]]]></description>
										<content:encoded><![CDATA[<header class="entry-header">
<h1><span style="color: #ff0000;">How to Install Node-Red to Home Assistant &#8211; Using Node-Red for Complex Home Automations</span></h1>
<p>Node-RED is a flow-based, low-code development tool for visual programming, originally developed by IBM for wiring together hardware devices, APIs and online services as part of the Internet of things. Node-RED provides a web browser-based flow editor, which can be used to create JavaScript functions.</p>
</header>
<p class="has-text-align-center">This guide will show you how to install Node-Red to Home Assistant and take you through a basic flow.</p>
<p>Node-Red is a low-code development tool for building simple to complex automation flows. The software runs within a web browser and works great within Home Assistant. The software is relatively easy to learn and allows easy viewing of complex logic flows.</p>
<p>Using Node-Red gives you an excellent visual overview of automation flows, making it much easier to understand, edit, and create. You can build flows that control automatic gates, lights, water pumps, and more.</p>
<p>If you haven’t already, we reco</p>
<p>This tutorial will explain how to install Node-Red to Home Assistant. We also go through the basics of setting up an automation flow. Both of these topics give you a decent insight into how you can get the most out of the software.</p>
<div id="AdThrive_Content_1_desktop" class="adthrive-ad adthrive-sticky-container adthrive-content adthrive-content-1 adthrive-ad-cls adthrive-video-stickyoutstream-new-player" data-google-query-id="CN75yfa_640DFS_rrQAd2XI7jg">
<h2 id="installing-node-red" class="wp-block-heading lbb-section-break mt-5 text-center">Installing Node-Red</h2>
<p><a href="https://nodered.org/" target="_blank" rel="noopener">Node-RED: Low-code programming for event-driven applications</a></p>
<p>The installation of Node Red is very straightforward, but there are a few requirements for a smooth installation process.</p>
<p>To install Node-Red within Home Assistant, you must run a version that supports add-ons such as supervised or the operating system. Alternatively, you can set up Node-Red as a separate docker and connect it to Home Assistant.</p>
<p><strong class="step_numbering">1.</strong> Within the Home Assistant web interface, click on the <strong>settings</strong> tab and then click on <strong>add-ons</strong>.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20807" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Home-Assistant-Settings-Page-with-Add-Ons-1.webp" alt="" width="730" height="750" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Home-Assistant-Settings-Page-with-Add-Ons-1.webp 730w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Home-Assistant-Settings-Page-with-Add-Ons-1-389x400.webp 389w" sizes="(max-width: 730px) 100vw, 730px" /></figure>
<p><strong class="step_numbering">2.</strong> Click on <strong>add-store</strong> in the bottom right corner of the screen.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20806" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Click-on-Add-on-Store-Button-2.webp" alt="" width="730" height="596" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Click-on-Add-on-Store-Button-2.webp 730w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Click-on-Add-on-Store-Button-2-400x327.webp 400w" sizes="(max-width: 730px) 100vw, 730px" /></figure>
<p><strong class="step_numbering">3.</strong> Using the search box, search for <strong>Node Red</strong>. Alternatively, you can scroll through the page until you find the Node-Red add-on.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20805" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Add-On-Store-Search-Node-Red.webp" alt="" width="730" height="256" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Add-On-Store-Search-Node-Red.webp 730w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Add-On-Store-Search-Node-Red-400x140.webp 400w" sizes="(max-width: 730px) 100vw, 730px" /></figure>
<p><strong class="step_numbering">4.</strong> The page you should now see will contain all the details about the add-on. You can check through all the details if you want to know what you are about to install. Once you are ready to install, click <strong>Install</strong>.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20804" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Home-Assistant-Node-Red-Install-Screen.webp" alt="" width="730" height="534" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Home-Assistant-Node-Red-Install-Screen.webp 730w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Home-Assistant-Node-Red-Install-Screen-400x293.webp 400w" sizes="(max-width: 730px) 100vw, 730px" /></figure>
<p><strong class="step_numbering">5.</strong> Now, navigate to the configuration tab. In this tab, locate the <code>credential_secret</code> field and enter a strong password. Make sure you save this password, as you may need it in the future. I use 1Password for storing passwords, but other software such as <a href="https://pimylifeup.com/raspberry-pi-bitwarden/">Bitwarden</a> or <a href="https://0g.pimylifeup.com/czn8ML/nordpass" target="_blank" rel="noreferrer noopener sponsored nofollow">Nordpass</a> (Affiliate Link) would also be solid choices.</p>
<p>You will also need to disable SSL if it is not enabled on your Home Assistant installation. To disable SSL, click the SSL button so it is greyed out. If you leave it on and Home Assistant does not support SSL, Node-Red will fail to start.</p>
<p>Once you are done, click on <strong>save</strong>.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20803" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Credential-Secret-and-Disable-SSL.webp" alt="" width="730" height="695" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Credential-Secret-and-Disable-SSL.webp 730w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Credential-Secret-and-Disable-SSL-400x381.webp 400w" sizes="(max-width: 730px) 100vw, 730px" /></figure>
<p><strong class="step_numbering">6.</strong> After you have saved the <strong>credential secret</strong> and <strong>disabled SSL</strong>, return to the <strong>info</strong> tab. On this page, click on “<strong>Start</strong>“. Node-Red should start without issue. If it is not starting, navigate to the <strong>log</strong> tab and look through the logs for errors.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20802" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Home-Assistant-Node-Red-Installed.webp" alt="" width="730" height="362" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Home-Assistant-Node-Red-Installed.webp 730w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Home-Assistant-Node-Red-Installed-400x198.webp 400w" sizes="(max-width: 730px) 100vw, 730px" /></figure>
<p><strong class="step_numbering">7.</strong> If you click on Node-Red in the sidebar or “<strong>Open Web UI</strong>” on the add-on page, it will take you to the Node-Red application. You can now start writing your flows to automate your Home Assistant setup.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20801" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Started.webp" alt="" width="730" height="410" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Started.webp 730w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Started-400x225.webp 400w" sizes="(max-width: 730px) 100vw, 730px" /></figure>
<div id="AdThrive_Content_10_desktop" class="adthrive-ad adthrive-sticky-container adthrive-content adthrive-content-10 adthrive-ad-cls" data-google-query-id="CLPJkZXA640DFX-YjggdCeEn2g">
<div id="google_ads_iframe_/18190176,22523461534/AdThrive_Content/5c49e4afdf7d2523f3865216_0__container__"></div>
</div>
<h2 id="creating-your-first-node-red-flow" class="wp-block-heading lbb-section-break mt-5 text-center">Creating your First Node-Red Flow</h2>
<p>Node-Red can be a little daunting at first, but once you understand the basics, it is a powerful tool that allows you to handle complex and simple automations.</p>
<p>In this short tutorial, we will go through the basics of creating a flow that uses a Home Assistant node.</p>
<p>The following steps will take you through how to send a notification whenever the temperature of our weather station exceeds 15°C.</p>
<p><strong class="step_numbering">1.</strong> The first node we will use is the “<strong>Events: State</strong>” node. Drag this node onto the grid</p>
<div id="AdThrive_Content_11_desktop" class="adthrive-ad adthrive-sticky-container adthrive-content adthrive-content-11 adthrive-ad-cls" data-google-query-id="COPJ1ZXA640DFYyAjggdCzAivw">
<div id="google_ads_iframe_/18190176,22523461534/AdThrive_Content/5c49e4afdf7d2523f3865216_1__container__"></div>
</div>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20800" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Create-Events-State-Node.webp" alt="" width="730" height="515" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Create-Events-State-Node.webp 730w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Create-Events-State-Node-400x282.webp 400w" sizes="(max-width: 730px) 100vw, 730px" /></figure>
<div id="AdThrive_Content_12_desktop" class="adthrive-ad adthrive-sticky-container adthrive-content adthrive-content-12 adthrive-ad-cls" data-google-query-id="CIbp8pXA640DFfmYjggdjYESSg">
<div id="google_ads_iframe_/18190176,22523461534/AdThrive_Content/5c49e4afdf7d2523f3865216_2__container__"></div>
</div>
<p>Next, double-click on the node to open the options available. Fill in each of the relevant properties. Below is what I filled in.</p>
<ul class="wp-block-list">
<li><strong>Name</strong>: Check Temperature</li>
<li><strong>Server</strong>: Home Assistant</li>
<li><strong>Entity</strong>: Outdoor Temperature</li>
<li><strong>If State</strong>: &gt;= 15 (Greater or equal to 15)</li>
<li><strong>For</strong>: 1 Minute</li>
<li><strong>State type</strong>: Number</li>
</ul>
<p>I also do not have any checkboxes ticked for “<strong>Ignore State Change Event When</strong>“.</p>
<figure class="wp-block-image aligncenter size-large"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20799" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/State-Node-Properties.webp" alt="" width="730" height="1205" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/State-Node-Properties.webp 730w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/State-Node-Properties-242x400.webp 242w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/State-Node-Properties-620x1024.webp 620w" sizes="(max-width: 730px) 100vw, 730px" /></figure>
<div id="AdThrive_Content_13_desktop" class="adthrive-ad adthrive-sticky-container adthrive-content adthrive-content-13 adthrive-ad-cls" data-google-query-id="CJvytZbA640DFfLprQAdVdUSiA">
<div id="google_ads_iframe_/18190176,22523461534/AdThrive_Content/5c49e4afdf7d2523f3865216_3__container__"></div>
</div>
<p><strong class="step_numbering">2.</strong> Next, drag and drop a debug node. These nodes will output data that can help diagnose and fix issues with your flows.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20798" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Nodes.webp" alt="" width="633" height="301" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Nodes.webp 633w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Nodes-400x190.webp 400w" sizes="(max-width: 633px) 100vw, 633px" /></figure>
<p>On each node, there are dots. These dots represent different functions. For example, our <strong>Check Temperature</strong> node has two dots. One is for when our logic is false, and the other for when it is true.</p>
<p>We click and drag our true node and connect it to the debug node.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20797" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Debug-Nodes.webp" alt="" width="501" height="234" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Debug-Nodes.webp 501w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Debug-Nodes-400x187.webp 400w" sizes="(max-width: 501px) 100vw, 501px" /></figure>
<div id="AdThrive_Content_14_desktop" class="adthrive-ad adthrive-sticky-container adthrive-content adthrive-content-14 adthrive-ad-cls" data-google-query-id="CMHO9JbA640DFcC0jggdZkAAjg">
<div id="google_ads_iframe_/18190176,22523461534/AdThrive_Content/5c49e4afdf7d2523f3865216_4__container__"></div>
</div>
<p>The flow will run when you click deploy in the top right-hand corner.</p>
<p>In this example, if the temperature exceeds 15°C, the debug node will output after 1 minute. If it is not higher than 15°C, nothing will output.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20796" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Sidebar-Debug-Info.webp" alt="" width="312" height="298" /></figure>
<p><strong class="step_numbering">3.</strong> Next, we will want to notify our users that the temperature is too high. To do this, drag a “<strong>Call Service</strong>” node onto the grid. Connect the true output to the input on the “<strong>Call Service</strong>” Node.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20795" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Call-Service-Node.webp" alt="" width="544" height="219" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Call-Service-Node.webp 544w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Call-Service-Node-400x161.webp 400w" sizes="(max-width: 544px) 100vw, 544px" /></figure>
<div id="AdThrive_Content_15_desktop" class="adthrive-ad adthrive-sticky-container adthrive-content adthrive-content-15 adthrive-ad-cls" data-google-query-id="CO2HyJfA640DFcmZjggdo_wXWw">
<div id="google_ads_iframe_/18190176,22523461534/AdThrive_Content/5c49e4afdf7d2523f3865216_5__container__"></div>
</div>
<p>Now, double-click on the call service node to edit it. Fill in each of the relevant properties. Below is what I filled in.</p>
<ul class="wp-block-list">
<li><strong>Name</strong>: Enter the name that you want the node to be referred to.</li>
<li><strong>Server</strong>: You shouldn’t need to update this as it should be <strong>Home Assistant</strong>.</li>
<li><strong>Domain</strong>: You will need to set this to <strong>notify</strong>.</li>
<li><strong>Service</strong>: Choose a device that you wish to notify. Choosing the <strong>notify</strong> option will notify all possible users.</li>
<li><strong>Data</strong>: This is where you need to specify the notification details. At the bottom of the properties is an example. Clicking “<strong>Load Example Data</strong>” will pre-populate the data field, which you can easily edit.</li>
</ul>
<p>Below is an example of my entry into the data field.</p>
<pre class="wp-block-code language-json"><code class="header language-json"><span class="hljs-punctuation">{</span>
   <span class="hljs-attr">"message"</span><span class="hljs-punctuation">:</span><span class="hljs-string">"Temperature is too High!"</span><span class="hljs-punctuation">,</span>
   <span class="hljs-attr">"title"</span><span class="hljs-punctuation">:</span><span class="hljs-string">"The temperature is higher than 15°C."</span>	
<span class="hljs-punctuation">}</span></code><a class="copy-code-block fa-copy" href="https://pimylifeup.com/install-node-red-home-assistant/#copy" aria-label="Copy code to clipboard">Copy</a></pre>
<div id="AdThrive_Content_16_desktop" class="adthrive-ad adthrive-sticky-container adthrive-content adthrive-content-16 adthrive-ad-cls" data-google-query-id="CMrL-JfA640DFeqEjggdPM8ijw">
<div id="google_ads_iframe_/18190176,22523461534/AdThrive_Content/5c49e4afdf7d2523f3865216_6__container__"></div>
</div>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20794" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Call-Service-Node-Properties.webp" alt="" width="531" height="807" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Call-Service-Node-Properties.webp 531w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Call-Service-Node-Properties-263x400.webp 263w" sizes="(max-width: 531px) 100vw, 531px" /></figure>
<div id="AdThrive_Content_17_desktop" class="adthrive-ad adthrive-sticky-container adthrive-content adthrive-content-17 adthrive-ad-cls" data-google-query-id="CLizl5jA640DFZLArQAdHhQDfQ">
<div id="google_ads_iframe_/18190176,22523461534/AdThrive_Content/5c49e4afdf7d2523f3865216_7__container__"></div>
</div>
<p><strong class="step_numbering">4.</strong> To avoid too many notifications, you may want to place a <strong>delay</strong> node. This node will allow a single notification to be sent for a specified time. To do this, drag and drop a <strong>delay node</strong> in between our check temperature and notify gus nodes.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20793" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Rate-Limit.webp" alt="" width="855" height="262" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Rate-Limit.webp 855w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Rate-Limit-400x123.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Rate-Limit-768x235.webp 768w" sizes="(max-width: 855px) 100vw, 855px" /></figure>
<p>Double-click on the delay node and update the settings to the following.</p>
<ul class="wp-block-list">
<li><strong>Action</strong>: Rate Limit and All Messages.</li>
<li><strong>Rate</strong>: 1 msg(s) per 15 minutes.</li>
<li>Change <strong>Queue Intermediate Messages</strong> to <strong>Drop Intermediate Messages</strong></li>
<li><strong>Name</strong>: Rate Limit</li>
</ul>
<div id="AdThrive_Content_18_desktop" class="adthrive-ad adthrive-sticky-container adthrive-content adthrive-content-18 adthrive-ad-cls" data-google-query-id="CJavsZjA640DFarArQAdu-I0eA">
<div id="google_ads_iframe_/18190176,22523461534/AdThrive_Content/5c49e4afdf7d2523f3865216_8__container__"></div>
</div>
<p>These properties will allow a single message every fifteen minutes. Any messages that try to be sent in the meantime will be dropped.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20792" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Delay-Node-Properties-v2.webp" alt="" width="493" height="434" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Delay-Node-Properties-v2.webp 493w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Delay-Node-Properties-v2-400x352.webp 400w" sizes="(max-width: 493px) 100vw, 493px" /></figure>
<div id="AdThrive_Content_19_desktop" class="adthrive-ad adthrive-sticky-container adthrive-content adthrive-content-19 adthrive-ad-cls" data-google-query-id="COa24ZjA640DFUy-jggd3GY6fw">
<div id="google_ads_iframe_/18190176,22523461534/AdThrive_Content/5c49e4afdf7d2523f3865216_9__container__"><iframe id="google_ads_iframe_/18190176,22523461534/AdThrive_Content/5c49e4afdf7d2523f3865216_9" tabindex="0" title="3rd party ad content" src="https://2ce263ff02c48bd25ced62d985b69e18.safeframe.googlesyndication.com/safeframe/1-0-45/html/container.html" name="" width="1" height="1" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" sandbox="allow-forms allow-popups allow-popups-to-escape-sandbox allow-same-origin allow-scripts allow-top-navigation-by-user-activation" data-is-safeframe="true" aria-label="Advertisement" data-google-container-id="v" data-load-complete="true" data-mce-fragment="1"></iframe></div>
</div>
<p><strong class="step_numbering">5.</strong> You should now have a basic flow that will notify users whenever the temperature goes above 15°C for over a minute. Feel free to change and alter this flow for other purposes.</p>
<p>You can remove the debug node if you are finished debugging. Alternatively, you can click the green square next to the node to deactivate it.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20791" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Disable-Debug.webp" alt="" width="730" height="224" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Disable-Debug.webp 730w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Disable-Debug-400x123.webp 400w" sizes="(max-width: 730px) 100vw, 730px" /></figure>
<h2 id="conclusion" class="wp-block-heading lbb-section-break mt-5 text-center">Conclusion</h2>
<p>I hope you now have Node-Red installed and configured on your Home Assistant installation. Our basic flow introduced some basics of using the software to run automations. Once you understand the basics, you can create some cool automations using the data from some of the sensors and devices in your home.</p>
<p>We are constantly working on more Home Assistant tutorials, so if there is anything that you would like to see, please let us know. I recommend checking out some of the other tutorials for great ideas on what you can do with this amazing software.</p>
<p>If you encounter any problems or have any suggestions, please do not hesitate to leave a comment down below. <a href="https://pimylifeup.com/install-node-red-home-assistant/" target="_blank" rel="noopener">source</a></p>
</div>
<div data-google-query-id="CN75yfa_640DFS_rrQAd2XI7jg"></div>
<div data-google-query-id="CN75yfa_640DFS_rrQAd2XI7jg">
<hr />
</div>
<div class="field field-name-field-title-article field-type-text field-label-hidden">
<div class="field-items">
<h1 class="field-item even">Node-RED, the visual programming tool for Internet of Things</h1>
<div class="blog-header">
<div class="field field-name-field-title-article field-type-text field-label-hidden">
<div class="field-items"></div>
</div>
</div>
<div class="blog-image">
<div class="field field-name-field-media field-type-media field-label-hidden">
<div class="field-items">
<div class="field-item even">
<div id="file-920" class="file file-image file-image-png">
<h2 class="element-invisible"></h2>
<div class="content"><img loading="lazy" decoding="async" class="alignnone  wp-image-20809" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-example-article-hello-world_1-1-1024x568.png" alt="" width="1006" height="558" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-example-article-hello-world_1-1-1024x568.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-example-article-hello-world_1-1-400x222.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-example-article-hello-world_1-1-768x426.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-example-article-hello-world_1-1-1536x852.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-example-article-hello-world_1-1-2048x1136.png 2048w" sizes="(max-width: 1006px) 100vw, 1006px" /></div>
</div>
</div>
</div>
</div>
</div>
<div class="blog-content">
<div class="field field-name-body field-type-text-with-summary field-label-hidden">
<div class="field-items">
<div class="field-item even">
<p>&nbsp;</p>
<p>From the beginning of programming, one of the industry’s main challenges has been to <strong>facilitate the applications development to simplify the integration</strong> between the hardware devices, the software and us, the humans. Thanks to Node-RED we are much closer of this goal. <strong>Programming, without programming</strong>.</p>
<p><strong>What is Node-RED and what is it for?</strong></p>
<p>Node-RED is an open-source development tool based on visual programming that was created by IBM to connect hardware devices, APIs and online services.</p>
<p>Node-RED is a solid tool, easy to learn, and it does not require any programming knowledge. It has been consolidated as one of the main applications for <strong>real-time data management and transformation</strong> for IoT and Industry 4.0 solutions.</p>
<p>Node-RED allows to graphically connect predefined blocks, called nodes, to develop a concrete task. The nodes connection, usually a combination of input nodes, processing nodes and output nodes, when wired together, make up a flow.</p>
<p>Among all the available nodes we can find standard protocols as <strong>MQTT, REST, Modbus, OPC-UA, Bacnet, Websocket</strong>; and third party API integrations as <strong>Microsoft Azure, Amazon Web Services, Twitter, Facebook</strong> and many more.</p>
<p>&nbsp;</p>
<div align="center"><img loading="lazy" decoding="async" class="size-full wp-image-20811 alignnone" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/node_red_mqtt_modbus_example.png" alt="" width="681" height="478" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/node_red_mqtt_modbus_example.png 681w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node_red_mqtt_modbus_example-400x281.png 400w" sizes="(max-width: 681px) 100vw, 681px" /></div>
<p>&nbsp;</p>
<p><strong>Where can I install Node-RED?</strong></p>
<p>Node-RED is built on Node.js, taking full advantage of its power and <strong>assuring scalability, liability and low hardware requirements</strong>. These features allow to run Node-RED in personal <strong>computers, cloud servers and low-cost embedded</strong> hardware.</p>
<p>If you want to take your first steps in Node-RED you just need to click <a href="https://nodered.org/docs/getting-started/">here</a> to access to all the documentation. Follow step by step how to install the tool on your computer, your cloud services regular provider or your embedded device <a href="https://www.pickdata.net/emanager-industrial-iot-modular-controller-edge-computing">eManager</a>.</p>
<p>&nbsp;</p>
<p><strong>Nodes library</strong></p>
<p>The nature of the tool, being open source, and the facility to develop new nodes, come together into a <a href="https://flows.nodered.org/">nodes library</a> which grows each day with new community contributions.</p>
<p>Nowadays we can find <strong>more than 2500 available nodes</strong> in the Node-RED official library, including Smart Home integrations, converters between IoT protocols, geolocation functions, OAuth2 authentication and many more.</p>
<p>&nbsp;</p>
<p><strong>Hello world in Node-RED</strong></p>
<p>To conclude this article there is no better way than taking your first steps on Node-RED generating the classic Hello world. Below, we show step by step the process to achieve it:</p>
<p><strong>Message creation with Inject node</strong></p>
<ol>
<li>If you are running Node-RED on your computer, you can access <a href="http://127.0.0.1:1880/">http://127.0.0.1:1880</a> or whatever address or hostname you’re using</li>
<li>If it is our first time in Node-RED, we will see a flow named <em>Flow 1</em></li>
<li>On the node palette on the left side of the Node-RED, we will select the <em>Inject</em> node and will drag it onto our flow</li>
<li>In order to edit the node we will double click on it. After that, we will select <em>string </em>on the Payload field and we will write <strong>Hello world!</strong></li>
<li>Once we finish the previous steps, we click Done</li>
</ol>
<div align="center"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20812" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-RED-Hello-World-PickData-1.png" alt="" width="681" height="523" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-RED-Hello-World-PickData-1.png 681w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-RED-Hello-World-PickData-1-400x307.png 400w" sizes="(max-width: 681px) 100vw, 681px" /></div>
<p><strong>Printing our message</strong></p>
<ol>
<li>In order to add a destination for our message we will select the <em>Debug</em> node. We will click and drag it onto our flow. It’s very important to place it on the right-hand side of the <em>Inject</em> node</li>
<li>To connect both nodes we just need to click the <em>Inject</em> node&#8217;s output and drag it to the <em>Debug</em> node&#8217;s input. A wire that links both nodes will be created</li>
<li><em>Debug</em> node will automatically print the message to the console window as we will see in the next step</li>
</ol>
<div align="center"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20813" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-RED-Hello-World-PickData-2.png" alt="" width="681" height="522" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-RED-Hello-World-PickData-2.png 681w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-RED-Hello-World-PickData-2-400x307.png 400w" sizes="(max-width: 681px) 100vw, 681px" /></div>
<p><strong>Deployment</strong></p>
<ol>
<li>In order to start our application you must click on <em>Deploy</em> button</li>
<li>Now click the <em>Debug</em> tab in the right-hand side of the editor window</li>
<li>Finally, to launch our message you will click on the blue button coming out from the left-hand side of the <em>Inject</em> node</li>
<li>“Hello world” will appear on the <em>Debug</em> screen. Welcome to <strong>Node-RED</strong>!</li>
</ol>
<div align="center"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20814" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-RED-Hello-World-PickData-3.png" alt="" width="1001" height="524" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-RED-Hello-World-PickData-3.png 1001w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-RED-Hello-World-PickData-3-400x209.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-RED-Hello-World-PickData-3-768x402.png 768w" sizes="(max-width: 1001px) 100vw, 1001px" /></div>
<p>&nbsp;</p>
<p>As PickData, we firmly believe in solutions like Node-RED, because those allow you to focus on what really matters, <strong>bring our added value to the solutions</strong> and skip losing time between ins and outs of the usual programming. <a href="https://www.pickdata.net/news/node-red-visual-programming-tool-iot" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
</div>
</div>
</div>
</div>
<div></div>
</div>
</div>
<hr />
<h1 class="article-header-title">Node-RED has replaced my complex Home Assistant automations, and it does them so much better</h1>
<p><img loading="lazy" decoding="async" class="alignnone  wp-image-20815" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/deploy-options-in-node-red-in-home-assistant.avif" alt="" width="1442" height="810" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/deploy-options-in-node-red-in-home-assistant.avif 2200w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/deploy-options-in-node-red-in-home-assistant-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/deploy-options-in-node-red-in-home-assistant-1024x575.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/deploy-options-in-node-red-in-home-assistant-768x431.avif 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/deploy-options-in-node-red-in-home-assistant-1536x863.avif 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/deploy-options-in-node-red-in-home-assistant-2048x1151.avif 2048w" sizes="(max-width: 1442px) 100vw, 1442px" /></p>
<p class="adsninja-injected-repeatable-ad-afterend">The self-hosting ecosystem is rife with cool and quirky apps designed to automate every facet of your life. There’s the holy <a href="https://www.xda-developers.com/use-terraform-with-proxmox/" target="_blank" rel="noopener">Terraform</a> and <a href="https://www.xda-developers.com/ansible-automation/" target="_blank" rel="noopener">Ansible</a> combo for home lab enthusiasts who love watching VMs come to life without pressing a single button, while n8n can handle all software-based automations. On the smart home side, you’ll often find <a href="https://www.xda-developers.com/beginners-guide-to-setting-up-home-assistant/" target="_blank" rel="noopener">Home Assistant</a> as the most recommended utility for creating schematics to control your IoT gadgets. And well, HASS can serve you well with its trigger-action workflows.</p>
<p>For YAML experts, you can even design long scripts to automate your smart home. But once you get into complicated workflows involving multiple sensors, actuators, and if-else statements, HASS starts to become rather unintuitive. While I still rely on Home Assistant for quick automations, Node-RED is my preferred platform for creating extended automation workflows spanning several smart devices in my living space.</p>
<div id="220d-4a48-b2cfb421ee77" class="display-card  article article-card small  no-badge  active-content                      " data-include-community-rating="false" data-nosnippet="">
<div class="w-img ">
<div class="body-img landscape ">
<div class="responsive-img  img-featured-4-pin-single-size-featured-secondary" data-img-url="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/05/home-assistant-frigate.jpg" data-modal-id="single-image-modal" data-modal-container-id="single-image-modal-container" data-img-caption="&quot;&quot;">
<figure><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20816" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-frigate.avif" alt="" width="844" height="536" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-frigate.avif 844w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-frigate-400x254.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-frigate-768x488.avif 768w" sizes="(max-width: 844px) 100vw, 844px" /></figure>
</div>
</div>
</div>
<div class="w-display-card-content regular article-block">
<p class="display-card-excerpt">There&#8217;s nothing you can&#8217;t pull off with Home Assistant blueprints</p>
<div class="w-display-card-extra"></div>
<div class="w-display-card-details">
<div class="w-display-card-meta"></div>
</div>
</div>
</div>
<h2 id="it-pairs-well-with-my-home-assistant-devices">It pairs well with my Home Assistant devices</h2>
<h3 id="but-hass-isn-rsquo-t-the-only-data-server-for-my-node-red-instance">But HASS isn’t the only data server for my Node-RED instance</h3>
<p>I consider Home Assistant the centerpiece of my rat’s nest of an apartment and have mapped most smart devices, IoT gadgets, and even home lab equipment (via HACS integrations) to my HASS hub. As such, it acts as a data-gathering terminal in addition to its role as a control center.</p>
<p>Since my Node-RED instance is connected to my HASS server, it can directly grab statistics from my devices and push any message payloads I define in my custom workflows. I use a standalone Node-RED container instead of running it on top of Home Assistant, so I don’t have to rely on just HASS for my smart home automation.</p>
<p class="adsninja-injected-repeatable-ad-afterend">On that subject, I’ve already connected my Node-RED server to a Raspberry Pi-based MQTT broker, so I can automate MQTT communication with just these services. Heck, it even integrates with external APIs and webhooks, making it perfect for the times when I want to use the VMs and containers from my Proxmox server for my home automation projects.</p>
<h2 id="amazing-for-automation-chains">Amazing for automation chains</h2>
<h3 id="the-node-based-workflow-makes-everything-easier">The node-based workflow makes everything easier</h3>
<div class="body-img landscape ">
<div class="responsive-img  image-expandable  img-article-item" data-img-url="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/03/node-red-home-assistant-1.jpg" data-modal-id="single-image-modal" data-modal-container-id="single-image-modal-container" data-img-caption="&quot;&quot;">
<figure><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20817" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-home-assistant-1.avif" alt="" width="1650" height="928" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-home-assistant-1.avif 1650w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-home-assistant-1-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-home-assistant-1-1024x576.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-home-assistant-1-768x432.avif 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-home-assistant-1-1536x864.avif 1536w" sizes="(max-width: 1650px) 100vw, 1650px" /></figure>
</div>
</div>
<p>Upon first glance, a Node-RED canvas filled to the brim with node chains, functions, and variables can seem intimidating. However, the ability to represent every device as a node makes it easy to organize everything, and I can import multiple IoT products inside a single workflow.</p>
<p>On Home Assistant, I’d have to cycle between the Entities, Helpers, Scripts, and Events tabs every time I want to create a multi-device automation chain. Besides the added advantage of accessing my smart devices from a single page, Node-RED lets me reuse the function nodes as many times as I want, which is a godsend for projects requiring complex if-else logic with branching instructions.</p>
<h3 id="no-more-yaml-shenanigans">No more YAML shenanigans</h3>
<div class="valnet-gallery">
<div id="article-gallery-1-645238902" class="article__gallery type-gallery " data-gallery-thumbnail-id="gallery-thumbnails-1-645238902" data-gallery-id="main-carousel-1-645238902" data-article-gallery="article-gallery-modal-1-645238902" data-gallery-lightbox="gallery-modal-1-645238902" data-gallery-thumbnail-img-class="gallery-thumbnails-1-645238902-img">
<div class="w-gallery-carousel">
<section id="main-carousel-1-645238902" class="splide splide-gallery splide--fade splide--ltr splide--draggable is-active is-overflow is-initialized" data-gallery-expanded-id="main-expanable-carousel-1-645238902" data-gallery-expanded-thumbnail-id="expanded-gallery-thumbnails-1-645238902" aria-roledescription="carousel">
<div class="splide__arrows splide__arrows--ltr"><img loading="lazy" decoding="async" class="alignnone  wp-image-20818" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/collections-in-node-red-library.avif" alt="" width="1124" height="640" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/collections-in-node-red-library.avif 2458w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/collections-in-node-red-library-400x228.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/collections-in-node-red-library-1024x583.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/collections-in-node-red-library-768x437.avif 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/collections-in-node-red-library-1536x875.avif 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/collections-in-node-red-library-2048x1166.avif 2048w" sizes="(max-width: 1124px) 100vw, 1124px" /></div>
<div id="main-carousel-1-645238902-track" class="splide__track splide__track--fade splide__track--ltr splide__track--draggable" aria-live="polite" aria-atomic="true">
<p><img loading="lazy" decoding="async" class="alignnone  wp-image-20819" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/easily-adding-a-connecting-node-on-flow-sheet-in-node-red-with-home-assistant.avif" alt="" width="1226" height="690" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/easily-adding-a-connecting-node-on-flow-sheet-in-node-red-with-home-assistant.avif 1500w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/easily-adding-a-connecting-node-on-flow-sheet-in-node-red-with-home-assistant-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/easily-adding-a-connecting-node-on-flow-sheet-in-node-red-with-home-assistant-1024x576.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/easily-adding-a-connecting-node-on-flow-sheet-in-node-red-with-home-assistant-768x432.avif 768w" sizes="(max-width: 1226px) 100vw, 1226px" /></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20820" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-automation-nodes-in-node-red-library.avif" alt="" width="1500" height="844" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-automation-nodes-in-node-red-library.avif 1500w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-automation-nodes-in-node-red-library-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-automation-nodes-in-node-red-library-1024x576.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-automation-nodes-in-node-red-library-768x432.avif 768w" sizes="(max-width: 1500px) 100vw, 1500px" /></p>
<picture><source srcset="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/05/right-click-options-for-node-in-node-red-with-home-assistant.jpg?q=49&amp;fit=crop&amp;w=750&amp;h=422&amp;dpr=2" media="(min-width: 1024px)" data-srcset="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/05/right-click-options-for-node-in-node-red-with-home-assistant.jpg?q=49&amp;fit=crop&amp;w=750&amp;h=422&amp;dpr=2" /><source srcset="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/05/right-click-options-for-node-in-node-red-with-home-assistant.jpg?q=49&amp;fit=crop&amp;w=735&amp;h=413&amp;dpr=2" media="(min-width: 768px)" data-srcset="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/05/right-click-options-for-node-in-node-red-with-home-assistant.jpg?q=49&amp;fit=crop&amp;w=735&amp;h=413&amp;dpr=2" /><source srcset="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/05/right-click-options-for-node-in-node-red-with-home-assistant.jpg?q=49&amp;fit=crop&amp;w=705&amp;h=397&amp;dpr=2" media="(min-width: 481px)" data-srcset="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/05/right-click-options-for-node-in-node-red-with-home-assistant.jpg?q=49&amp;fit=crop&amp;w=705&amp;h=397&amp;dpr=2" /><source srcset="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/05/right-click-options-for-node-in-node-red-with-home-assistant.jpg?q=49&amp;fit=crop&amp;w=360&amp;h=202&amp;dpr=2" media="(min-width: 0px)" data-srcset="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/05/right-click-options-for-node-in-node-red-with-home-assistant.jpg?q=49&amp;fit=crop&amp;w=360&amp;h=202&amp;dpr=2" /><img loading="lazy" decoding="async" class="" src="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/05/right-click-options-for-node-in-node-red-with-home-assistant.jpg" alt="Right-click options for a node in Node-RED with Home Assistant" width="1316" height="740" data-img-url="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/05/right-click-options-for-node-in-node-red-with-home-assistant.jpg" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20822" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/right-click-options-for-node-in-node-red-with-home-assistant-1.avif" alt="" width="1500" height="844" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/right-click-options-for-node-in-node-red-with-home-assistant-1.avif 1500w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/right-click-options-for-node-in-node-red-with-home-assistant-1-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/right-click-options-for-node-in-node-red-with-home-assistant-1-1024x576.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/right-click-options-for-node-in-node-red-with-home-assistant-1-768x432.avif 768w" sizes="(max-width: 1500px) 100vw, 1500px" /></picture>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20823" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-backup-2.avif" alt="" width="1500" height="844" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-backup-2.avif 1500w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-backup-2-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-backup-2-1024x576.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-backup-2-768x432.avif 768w" sizes="(max-width: 1500px) 100vw, 1500px" /></p>
</div>
</section>
<section id="gallery-thumbnails-1-645238902" class="splide gallery-thumbnails splide--slide splide--ltr splide--draggable splide--nav is-active is-overflow is-initialized" aria-roledescription="carousel">
<div id="gallery-thumbnails-1-645238902-track" class="splide__track splide__track--slide splide__track--ltr splide__track--draggable splide__track--nav"></div>
</section>
</div>
</div>
</div>
<p>Although YAML syntax is nowhere near as complex as a mainstream programming language’s coding rules, it’s a pain to design complicated workflows with it. Home Assistant makes YAML scripting somewhat easy with the Developer Tools tab, but it’s far from the most intuitive option, especially since I can just use Node-RED.</p>
<p class="adsninja-injected-repeatable-ad-beforebegin">That’s because Node-RED has a minimal coding approach, as even the most complicated automation can be arranged in a node-based workflow. This visual aspect makes it easier to add nested logic, chains of loops, and long branches in a Node-RED canvas. As if that’s not enough, I can install custom modules and libraries for most communication protocols and external APIs in Node-RED.</p>
<h3 id="solid-troubleshooting-provisions">Solid troubleshooting provisions</h3>
<div class="body-img landscape ">
<div class="responsive-img  image-expandable  img-article-item" data-img-url="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/02/node-red-blinds.jpg" data-modal-id="single-image-modal" data-modal-container-id="single-image-modal-container" data-img-caption="&quot;&quot;">
<figure><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20824" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-blinds.avif" alt="" width="1650" height="928" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-blinds.avif 1650w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-blinds-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-blinds-1024x576.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-blinds-768x432.avif 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-blinds-1536x864.avif 1536w" sizes="(max-width: 1650px) 100vw, 1650px" /></figure>
</div>
</div>
<p>Finally, Node-RED makes finding errors in my workflow a cinch. It’s a lot easier to detect errors in a Node-RED-based flow than a huge YAML file, where I can have several indentation errors because of accidentally pressing the Spacebar or Enter keys. In contrast, my mistakes are infinitely easier to catch on Node-RED’s canvas, as I can see how the different gadgets affect each other.</p>
<h3 id="that-said-hass-is-better-for-simple-automation-projects">That said, HASS is better for simple automation projects</h3>
<div class="valnet-gallery">
<div id="article-gallery-2-495544307" class="article__gallery type-gallery " data-gallery-thumbnail-id="gallery-thumbnails-2-495544307" data-gallery-id="main-carousel-2-495544307" data-article-gallery="article-gallery-modal-2-495544307" data-gallery-lightbox="gallery-modal-2-495544307" data-gallery-thumbnail-img-class="gallery-thumbnails-2-495544307-img">
<div class="w-gallery-carousel">
<section id="main-carousel-2-495544307" class="splide splide-gallery splide--fade splide--ltr splide--draggable is-active is-overflow is-initialized" data-gallery-expanded-id="main-expanable-carousel-2-495544307" data-gallery-expanded-thumbnail-id="expanded-gallery-thumbnails-2-495544307" aria-roledescription="carousel"><button class="expand icon i-expand" type="button" data-stnl="{&quot;category&quot;:&quot;Click Interactions&quot;,&quot;name&quot;:&quot;Image Gallery&quot;,&quot;action&quot;:&quot;Gallery Fullscreen Open&quot;}"></button></p>
<div class="splide__arrows splide__arrows--ltr"></div>
<div id="main-carousel-2-495544307-track" class="splide__track splide__track--fade splide__track--ltr splide__track--draggable" aria-live="polite" aria-atomic="true">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20825" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-community-store.avif" alt="" width="1500" height="844" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-community-store.avif 1500w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-community-store-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-community-store-1024x576.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-community-store-768x432.avif 768w" sizes="(max-width: 1500px) 100vw, 1500px" /></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20826" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-dynamic-notifications-llm.avif" alt="" width="1500" height="844" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-dynamic-notifications-llm.avif 1500w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-dynamic-notifications-llm-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-dynamic-notifications-llm-1024x576.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-dynamic-notifications-llm-768x432.avif 768w" sizes="(max-width: 1500px) 100vw, 1500px" /></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20827" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-mqtt-5.avif" alt="" width="1500" height="844" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-mqtt-5.avif 1500w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-mqtt-5-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-mqtt-5-1024x576.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-mqtt-5-768x432.avif 768w" sizes="(max-width: 1500px) 100vw, 1500px" /></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20828" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-mqtt-4.avif" alt="" width="1500" height="844" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-mqtt-4.avif 1500w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-mqtt-4-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-mqtt-4-1024x576.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-mqtt-4-768x432.avif 768w" sizes="(max-width: 1500px) 100vw, 1500px" /></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20829" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-blueprints-5.avif" alt="" width="1500" height="844" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-blueprints-5.avif 1500w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-blueprints-5-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-blueprints-5-1024x576.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-blueprints-5-768x432.avif 768w" sizes="(max-width: 1500px) 100vw, 1500px" /></p>
</div>
</section>
</div>
</div>
</div>
<p class="adsninja-injected-repeatable-ad-afterend">So far, I’ve only discussed why Node-RED suits my smart home projects. But I’d be biased if I didn’t talk about its drawbacks. Despite providing easier methods for automating complex projects, Node-RED has a steeper learning curve than Home Assistant. Plus, community-created blueprints are a neat utility in Home Assistant for casual users who want to quick put together motion-controlled lights.</p>
<div class="an-injected" data-estimated-y-top="5406.96891784668" data-estimated-y-bottom="5556.96891784668" data-estimated-x-left="80.33333587646484" data-estimated-x-right="830.3333358764648">
<div id="adsninja-ad-zone-div-gpt-ad-1553804529761-ccr-REPEAT2" class="adsninja-ad-zone an-zone an-zone-content-character_count_repeatable an-can-change an-injector-zone an-zone-d in-sticky-content">
<div id="dynamically-injected-refresh-ad-zone-div-gpt-ad-1553804529761-ccr-REPEAT2" class="dynamically-injected-refresh-ad-zone" data-original-ad-element-id="div-gpt-ad-1553804529761-ccr-REPEAT2" data-current-ad-element-id="div-gpt-ad-1553804529761-ccr-REPEAT2" data-refresh-count="0" data-not-bidding-count="0" data-floating-allowed="true" data-refreshing-allowed="true">
<div class="ad-current">
<div id="ad-zone-container-div-gpt-ad-1553804529761-ccr-REPEAT2" class="ad-zone-container ad-zone-container-content-character-count-repeatable adsninja-ad-zone-container-with-set-height ad-zone-container-background-details-enabled ad-zone-container-loading-animation-enabled ad-loaded" data-no-fill-collapsable="false">
<div id="ad-zone-size-container-div-gpt-ad-1553804529761-ccr-REPEAT2" class="ad-zone-size-container ad-zone-size-container-content-character-count-repeatable">
<div class="ad-zone ad-zone-content-character-count-repeatable  ">
<div class="ad-zone-inline ad-zone-inline-content-character-count-repeatable">
<div id="div-gpt-ad-1553804529761-ccr-REPEAT2" data-google-query-id="CJG7x7LE640DFbuYjggdCL4PjQ">
<div id="google_ads_iframe_/39363775/XDA-Developers/Article_InContent_Desktop_3__container__"></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p>However, if you’re looking to build something as convoluted as a surveillance system that automatically turns on the lights and sets the right thermostat temperature when it detects your presence, it’s a good idea to go with Node-RED as your automation platform. <a href="https://www.xda-developers.com/node-red-has-replaced-my-complex-home-assistant-automations/" target="_blank" rel="noopener">source</a></p>
<hr />
<h1>Home Assistant with Node-Red</h1>
<p><iframe title="Node-Red Tutorial - Common Nodes Explained! (Chapters in the Timestamps) #nodered" width="640" height="360" src="https://www.youtube.com/embed/0osGkVHMugI?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<header class="entry-header">
<div class="entry-meta"></div>
</header>
<div class="entry-thumbnail"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20778" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_overview1.png" alt="" width="983" height="777" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_overview1.png 983w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_overview1-400x316.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_overview1-768x607.png 768w" sizes="(max-width: 983px) 100vw, 983px" /></div>
<div class="entry-content">
<p><a href="https://www.home-assistant.io/">Home Assistant</a> is an open source home automation platform that can monitor and control smart home devices and it integrates with many of other common systems.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20779" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_demo.png" alt="" width="1112" height="863" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_demo.png 1112w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_demo-400x310.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_demo-1024x795.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_demo-768x596.png 768w" sizes="(max-width: 1112px) 100vw, 1112px" /></p>
<p>Home Assistant installation is targeted for Raspberry Pi’s but other hardware options are available.</p>
<p>I was very impressed how easy it was to install Home Assistant and get a basic home integration system up and running.</p>
<p>There is a huge number of integration solutions (1500+) that connect to most of the mainstream products. However if you want to do some custom Arduino or Raspberry Pi connections there isn’t an easy “out of the box” solution.  To solve this requirement Home Assistant has included <a href="https://nodered.org/">Node-Red</a> as an add-on.</p>
<p>Node-RED is a visual programming tool for wiring together hardware devices, APIs and online services.</p>
<p>I found that getting the Node-Red integration was a little tricky. This blog will show how to get Node-Red integration working and it includes a simple simulator circuit.</p>
<h2>Getting Started</h2>
<p>The <a href="https://www.home-assistant.io/getting-started/" target="_blank" rel="noopener">installation instructions</a> are very straightforward. I would recommend using a wired connection for your Raspberry Pi. A wireless network connection is 100% possible but it is not in the base installation directions.</p>
<p>After the basic installation is complete, add-ons can be installed under the Supervisor-&gt;Dashboard. I would recommend installing “File editor” and “Terminal &amp; SSH” add-ons along with Node-Red.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20780" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_addons.png" alt="" width="983" height="777" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_addons.png 983w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_addons-400x316.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_addons-768x607.png 768w" sizes="(max-width: 983px) 100vw, 983px" /></p>
<p>I found that the Node-Red installed without any problems but it required some configuration changes before it would run.</p>
<p>In the Node Red add-on you will need to add a credential_secret and a password.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20781" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nodered_config.png" alt="" width="291" height="354" /></p>
<p>If Node-Red doesn’t start look at the log for errors (it’s at the bottom of the same page).</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20782" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nodered_log.png" alt="" width="638" height="781" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nodered_log.png 638w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nodered_log-327x400.png 327w" sizes="(max-width: 638px) 100vw, 638px" /></p>
<p>The base Node-Red installation has a very good selection of pre-installed nodes. If you wish to add more nodes see the “Manage Pallet” option that is accessed from the top right options icon.</p>
<p>At this stage Node-Red is somewhat standalone and it is not fully integrated with Home Assistant.</p>
<h2>Integrating Node-Red with Home Assistant</h2>
<p>The <a href="https://github.com/zachowj/hass-node-red">directions and files for Node-Red integration</a>  can be downloaded to your PC.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20783" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_nr_int_files.png" alt="" width="1036" height="612" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_nr_int_files.png 1036w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_nr_int_files-400x236.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_nr_int_files-1024x605.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_nr_int_files-768x454.png 768w" sizes="(max-width: 1036px) 100vw, 1036px" /></p>
<p>Specifically you want to <em><strong>custom_components/nodered</strong></em> directory and files, which will need to be moved to the Raspberry Pi. The Home Assistant “File editor” add-on can be used to create Pi directories and move files from your PC.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20784" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nodered_files.png" alt="" width="1299" height="780" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nodered_files.png 1299w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nodered_files-400x240.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nodered_files-1024x615.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nodered_files-768x461.png 768w" sizes="(max-width: 1299px) 100vw, 1299px" /></p>
<p>The following directories and file should now exist:</p>
<pre>/root/config/custom_components/nodered/__init__.py
/root/config/custom_components/nodered/__pycache__
/root/config/custom_components/nodered/binary_sensor.py
/root/config/custom_components/nodered/config_flow.py
/root/config/custom_components/nodered/const.py
/root/config/custom_components/nodered/discovery.py
/root/config/custom_components/nodered/manifest.json
/root/config/custom_components/nodered/save.txt
/root/config/custom_components/nodered/sensor.py
/root/config/custom_components/nodered/services.yaml
/root/config/custom_components/nodered/switch.py
/root/config/custom_components/nodered/websocket.py

/root/config/custom_components/nodered/.translations/en.json</pre>
<p>Once this is complete Home Assistant will need to be restarted.</p>
<h2>Including Node-Red Integrations</h2>
<p>The next step is to create sensors and switches in Node-Red that can be accessed in Home Assistant. Below is a simple circuit that sends a random number (0-100) to a HA entity.</p>
<p>This logic uses a <em>Big Timer</em> node, that generates a pulse every minute from the middle output pin. An <em>injector</em> node allow you to force a new value. A <em>random</em> node will output a new random number whenever the <em>Big Timer</em> or <em>Inject</em> nodes are triggered.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20785" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_circuit.png" alt="" width="1207" height="415" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_circuit.png 1207w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_circuit-400x138.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_circuit-1024x352.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_circuit-768x264.png 768w" sizes="(max-width: 1207px) 100vw, 1207px" /></p>
<p>Double-click on the HA entity to configure the HA server and other properties.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20786" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_entity_config.png" alt="" width="1141" height="563" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_entity_config.png 1141w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_entity_config-400x197.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_entity_config-1024x505.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_entity_config-768x379.png 768w" sizes="(max-width: 1141px) 100vw, 1141px" /></p>
<p>Once the logic is complete click the “Deploy” button to make the logic active.</p>
<p>Node-Red integration is enabled by adding it in the Configuration-&gt;Integration page.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20787" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_new_int.png" alt="" width="1138" height="965" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_new_int.png 1138w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_new_int-400x339.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_new_int-1024x868.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_new_int-768x651.png 768w" sizes="(max-width: 1138px) 100vw, 1138px" /></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20788" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_entities.png" alt="" width="898" height="551" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_entities.png 898w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_entities-400x245.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_entities-768x471.png 768w" sizes="(max-width: 898px) 100vw, 898px" /></p>
<h2>Overview Dashboard with Node-Red Data</h2>
<p>The final step is to modify the Overview Dashboard to include the Node-Red Entity.</p>
<p>For this example I added a gauge component using the Orange-Plus at the bottom right of this Configure UI page.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20789" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/config_ui.png" alt="" width="922" height="874" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/config_ui.png 922w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/config_ui-400x379.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/config_ui-768x728.png 768w" sizes="(max-width: 922px) 100vw, 922px" /></p>
<p>On the live Overview page it is possible to click on the gauge card and get more information about this sensor.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20778" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_overview1.png" alt="" width="983" height="777" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_overview1.png 983w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_overview1-400x316.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_overview1-768x607.png 768w" sizes="(max-width: 983px) 100vw, 983px" /></p>
<h2>Final Thoughts</h2>
<p>Home Assistant is a very well structured home automation solution that offers a number of excellent approaches to bring in data.</p>
<p>Node-Red is a very flexible programming environment that help expands connectivity to Arduino, Raspberry Pi and other 3rd party services that are not in the base Home Assistant software.</p>
<p class="entry-title"><a href="https://funprojects.blog/2020/03/23/home-assistant-with-node-red/" target="_blank" rel="bookmark noopener">source</a></p>
</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Google Breaks the Internent iwth this realistic Video &#038; Film AI  Flow &#8211; Create Hollywood like Scenes in seconds</title>
		<link>https://goodshepherdmedia.net/google-breaks-the-internent-iwth-this-realistic-video-film-ai-flow-create-hollywood-like-scenes-in-seconds/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 26 May 2025 17:59:38 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Business & Industry]]></category>
		<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Google Flow Video AI]]></category>
		<category><![CDATA[Money / Finances]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[VEO 3 AI]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🤖 AI Artificial Intelligence]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Filmaking AI]]></category>
		<category><![CDATA[Flow Ai]]></category>
		<category><![CDATA[Google Flow]]></category>
		<category><![CDATA[​Google Flow AI Filmmaking Tool]]></category>
		<category><![CDATA[Google VEO]]></category>
		<category><![CDATA[Google Veo 3]]></category>
		<category><![CDATA[Google VEO with Flow]]></category>
		<category><![CDATA[Google Video AI]]></category>
		<category><![CDATA[How to use Google Flow]]></category>
		<category><![CDATA[Video Ai]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=20585</guid>

					<description><![CDATA[Google Breaks the Internent iwth this realistic Video &#38; Film AI  Flow &#8211; Create Hollywood like Scenes in seconds Google&#8217;s New Video-Generating AI May Be the End of Reality as We Know It &#8220;I don&#8217;t want to be in your AI movie!&#8221; Google&#8217;s got a brand new AI video generator, and it&#8217;s so sophisticated that [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1><strong>Google Breaks the Internent iwth this realistic Video &amp; Film AI  Flow &#8211; Create Hollywood like Scenes in seconds</strong></h1>
<h2 class="mt-3 text-5xl leading-none text-gray-900 sm:mt-4 sm:text-6xl lg:text-6 font-ab">Google&#8217;s <span style="color: #0000ff;"><a style="color: #0000ff;" href="https://labs.google/flow/about" target="_blank" rel="noopener">New Video-Generating AI</a> </span>May Be the End of Reality as We Know It</h2>
<blockquote>
<h3 class="mt-2 leading-tight text-gray-900 text-4 font-k sm:text-5xl lg:text-5 ">&#8220;I don&#8217;t want to be in your AI movie!&#8221;</h3>
</blockquote>
<p><iframe title="Google Unveils &quot;Flow&quot; AI Model for Creating Videos | Vantage with Palki Sharma | N18G" width="640" height="360" src="https://www.youtube.com/embed/AQGIK6VPdZc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Google&#8217;s got a brand new AI video generator, and it&#8217;s so sophisticated that we&#8217;re starting to sweat around the collar a bit.</p>
<p><iframe title="Google&#039;s New Tool FLOW is INSANE! (AI-powered filmmaking with Veo 3)" width="640" height="360" src="https://www.youtube.com/embed/Csp-MHhxlTw?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Google DeepMind describes the new model, Veo 3, as capable of delivering &#8220;best in class quality, excelling in physics, realism and prompt adherence&#8221; — and as videos posted to social media indicate, that marketing doesn&#8217;t fall too far short.</p>
<p>The caliber of the video is indeed impressive. But the real quantum leap is that the system can produce audio that goes with the clip, ranging from sound effects to music to human speech and singing.</p>
<p>The internet was quick to riff on all those capabilities, sometimes in the very same clip.</p>
<div>
<div class="LazyFrame items-center cursor-pointer flex justify-center relative max-w-750 w-full" aria-hidden="true">
<p><iframe title="Google Veo 3 Demo - Singing and Music Videos , Shows" width="640" height="360" src="https://www.youtube.com/embed/Y9UX2qnJwPA?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<div class="bg-black bg-opacity-25 bottom-0 absolute top-0 w-full block h-full z-10"></div>
</div>
</div>
<div class="flex">
<div class="flex flex-col grow max-w-full">
<div class="text-neutral-content">
<div class="mb-sm mb-xs px-md xs:px-0 overflow-hidden" data-post-click-location="text-body">
<div id="t3_1krrv1o-post-rtjson-content" class="md max-h-[253px] overflow-hidden s:max-h-[318px] m:max-h-[337px] l:max-h-[352px] xl:max-h-[452px] text-14">
<p>Anyone will now be able to generate movies and no-one will know what is worth watching anymore.</p>
<p>I&#8217;m wondering how popular will consuming this zero-effort worlds be.</p>
<p>&#8220;We can talk!&#8221; one of the non-people exclaims.</p>
<p>&#8220;No more silence!&#8221; another enthuses.</p>
<p>As users commented on the thread, commercials and other human creations could soon be &#8220;cooked&#8221; thanks to the rapidly-accellerating technology.</p>
<p>&#8220;Netflix will be the first to roll this out,&#8221; another prophesied. &#8220;I should buy some stock. People will watch this shit like crazy.&#8221;</p>
<p>Over on Elon Musk&#8217;s X, that mix of loathing and excitement was similarly palpable.</p>
<p>In a lengthy thread, the AI-boosting account TechHalla showcased Veo 3 videos ranging from the fantastical (a giraffe riding a moped through Manhattan) to the mundane (a man teaching a classroom full of old people).</p>
<p>The video generator&#8217;s artificial physics were on full display in TechHalla&#8217;s roundup, with one showing a paper boat floating in a puddle before falling into a street hole looking more like the real thing and less like an animated still life than Veo 3&#8217;s predecessors.</p>
<div class="flex justify-center">
<div class="twitter-tweet twitter-tweet-rendered"><iframe id="twitter-widget-0" class="" title="X Post" src="https://platform.twitter.com/embed/Tweet.html?dnt=true&amp;embedId=twitter-widget-0&amp;features=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%3D%3D&amp;frame=false&amp;hideCard=false&amp;hideThread=false&amp;id=1924915630656168159&amp;lang=en&amp;origin=https%3A%2F%2Ffuturism.com%2Fgoogle-ai-video-generator-realistic&amp;sessionId=16f1d50d415b163b852d417b8eb53862125993fb&amp;siteScreenName=futurism&amp;theme=light&amp;widgetsVersion=2615f7e52b7e0%3A1702314776716&amp;width=500px" frameborder="0" scrolling="no" allowfullscreen="allowfullscreen" data-tweet-id="1924915630656168159" data-mce-fragment="1"></iframe></div>
</div>
<p>The thread&#8217;s standout, to our minds, was one showing a girl typing on a custom keyboard in a simulacrum of autonomous sensory meridian response, which is better known as ASMR. On first blush, it seems nothing spectacular is going on — until one recalls that AI image and video generators often used to struggle to make lifelike hands and fingers. And the online personalities who create ASMR content professionally? They&#8217;ll be quaking in their whisper-quiet boots after this one.</p>
<div class="flex justify-center">
<div class="twitter-tweet twitter-tweet-rendered"><iframe id="twitter-widget-1" class="" title="X Post" src="https://platform.twitter.com/embed/Tweet.html?dnt=true&amp;embedId=twitter-widget-1&amp;features=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%3D%3D&amp;frame=false&amp;hideCard=false&amp;hideThread=false&amp;id=1925046014689608146&amp;lang=en&amp;origin=https%3A%2F%2Ffuturism.com%2Fgoogle-ai-video-generator-realistic&amp;sessionId=16f1d50d415b163b852d417b8eb53862125993fb&amp;siteScreenName=futurism&amp;theme=light&amp;widgetsVersion=2615f7e52b7e0%3A1702314776716&amp;width=500px" frameborder="0" scrolling="no" allowfullscreen="allowfullscreen" data-tweet-id="1925046014689608146" data-mce-fragment="1"></iframe></div>
</div>
<div class="pw-ad-scroll-container pw-clearfix" data-pw-in-article="true">
<div class="pw_report_ad_container">
<div class="pw-border-incontent-before"></div>
<div class="pw-border-incontent-after">Given its sophistication, it&#8217;s no surprise that Google DeepMind&#8217;s latest creation can also generate horrific content, too.</div>
</div>
</div>
<p>&#8220;Please don&#8217;t finish writing that prompt,&#8221; the man implores. &#8220;I don&#8217;t want to be in your AI movie!&#8221;</p>
<p>The video then switches to an apparent post-apocalyptic street scene where the man and a female companion are seen trudging through rubble. The woman runs up to the non-existent camera and begs the viewer to &#8220;write a prompt that will make us happy.&#8221;</p>
<p>&#8220;Do it for once!&#8221; she shouts — and for just a second, we almost believed her.</p>
<p>Obviously, the &#8220;people&#8221; in that clip, like the others before it, are not real and were intentionally modeled via prompting to tug at our heartstrings — but these videos&#8217; ability to do so is pretty freaky. <a href="https://futurism.com/google-ai-video-generator-realistic" target="_blank" rel="noopener">source</a></p>
<hr />
</div>
</div>
</div>
</div>
</div>
<h1>AI &#8211; Google Introduces <a href="https://labs.google/flow/about" target="_blank" rel="noopener">Flow</a>: A New AI Filmmaking Tool Powered by Veo 3</h1>
<h2>A look at Google’s latest generative model Veo 3 and how it aims to provide a new AI filmmaking tool for creators.</h2>
<h3>​Google Flow AI Filmmaking Tool</h3>
<p>In what has become a familiar refrain over the past year and change, AI technology is pushing forward at breakneck speeds. There have been countless improvements to generative AI video technologies over the past few months, perhaps none as noteworthy as Google’s introduction of the company’s new Veo 3 generative AI video model.</p>
<p><iframe title="Introducing Flow | Google’s New AI Filmmaking Tool" width="640" height="360" src="https://www.youtube.com/embed/A0VttaLy4sU?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>On top of the Veo 3 announcement (that is also paired with a new Imagen 4 image model and other tools), Google is also rolling out Flow, the company’s new AI filmmaking tool. Let’s take a look at these new technologies and explore what they’re set to offer in the creative film and video space.</p>
<h3>Introducing Google Veo 3</h3>
<p>As a follow-up to Veo 2, which was quite noteworthy at its release, Veo 3 promises to be even more state-of-the-art and provide some of the most sophisticated generative AI videos known to mankind. Compared to Veo 2, Veo 3 is set to add more photorealism as well as the ability to better generate text and replicate real-world physics.</p>
<p>Veo 3 also gets a notable boost by adding audio generation for the first time, as well as the ability to add appropriate background noise and even dialogue for scenes with characters speaking with each other.</p>
<p>Veo 3 is available today for Google Ultra subscribers through the Gemini app as well as with Flow, which we’ll explore more about below.</p>
<h3>Google’s Flow AI Filmmaking Tool</h3>
<p>The biggest news here, along with Darren Aronofsky’s announcement of his own generative AI storytelling venture, ‘Primordial Soup’, which is set to use Google’s latest AI technologies, is this new Flow AI filmmaking tool.</p>
<p>Designed for (and by, reportedly) creatives in the industry, Flow is the only AI filmmaking tool custom-designed for Google’s most advanced models: Veo, Imagen, and Gemini. The goal of Flow is to help storytellers explore their ideas without limitations and create cinematic clips and scenes for their projects.</p>
<h3>Advanced AI Video Controls and Features</h3>
<p><iframe title="Introducing Veo 3: Old Sailor" width="640" height="360" src="https://www.youtube.com/embed/OW9q6SWTXt8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Flow is also set to offer some advanced features and functions, a few akin to what you’d find in Runway or other generative AI video model apps, but a few unique on their own. The highlights will include:</p>
<p>Camera Controls: Master your shot with direct control over camera motion, angles, and perspectives.<br />
Scenebuilder: Seamlessly edit and extend your existing shots, revealing more of the action or transitioning to what happens next with continuous motion and consistent characters.<br />
Asset Management: Easily manage and organize all of your ingredients and prompts.<br />
Flow TV: Spark your creativity with an ever-growing showcase of clips, channels, and content generated with Veo. You can see the exact prompts and techniques used for clips you like, providing a practical way to learn and adapt new styles.<br />
Flow is available to subscribers of our Google AI Pro and Google AI Ultra plans in the U.S., with more countries coming soon. You can find out more info on Flow and all of Google’s latest AI ventures on the company’s website here.</p>
<p>Google AI Pro gives you the key Flow features and 100 generations per month, and Google AI Ultra gives you the highest usage limits and early access to Veo 3 with native audio generation, bringing environmental sounds and character dialogue directly into video creation. <a href="https://nofilmschool.com/google-flow-ai-filmmaking-tool" target="_blank" rel="noopener">source</a></p>
<hr />
<h1 class="text-soft-black-core h5 md:h3 font-regular" data-cy="story-headline">Google&#8217;s new AI video tool floods internet with real-looking clips</h1>
<p><a href="https://labs.google/flow/about" target="_blank" rel="noopener">https://labs.google/flow/about</a></p>
<p>https://labs.google/fx/tools/flow</p>
<div class="gtmView mb-5 sm:mb-10" data-vars-content-id="39fec3e2-9916-40e7-b04d-c887288beba2" data-vars-event-name="story_view" data-vars-deprecated-content-id="39fec3e2-9916-40e7-b04d-c887288beba2" data-vars-deprecated-headline="Google's new AI video tool floods internet with real-looking clips" data-vars-deprecated-category="story" data-vars-deprecated-sub-category="story" data-vars-headline="Google's new AI video tool floods internet with real-looking clips" data-vars-latitude="33.84" data-vars-longitude="-117.6" data-vars-postal-code="92882" data-vars-product="core" data-vars-page-type="story" data-vars-sub-product="national" data-gtm-vis-recent-on-screen48430672_37="615" data-gtm-vis-first-on-screen48430672_37="615" data-gtm-vis-total-visible-time48430672_37="1000" data-gtm-vis-recent-on-screen48430672_468="615" data-gtm-vis-first-on-screen48430672_468="615" data-gtm-vis-total-visible-time48430672_468="1000" data-gtm-vis-recent-on-screen48430672_493="615" data-gtm-vis-first-on-screen48430672_493="615" data-gtm-vis-total-visible-time48430672_493="1000" data-gtm-vis-recent-on-screen48430672_501="615" data-gtm-vis-first-on-screen48430672_501="615" data-gtm-vis-total-visible-time48430672_501="1000" data-gtm-vis-recent-on-screen48430672_505="615" data-gtm-vis-first-on-screen48430672_505="615" data-gtm-vis-total-visible-time48430672_505="1000" data-gtm-vis-recent-on-screen48430672_506="616" data-gtm-vis-first-on-screen48430672_506="616" data-gtm-vis-total-visible-time48430672_506="1000" data-gtm-vis-recent-on-screen48430672_531="616" data-gtm-vis-first-on-screen48430672_531="616" data-gtm-vis-total-visible-time48430672_531="1000" data-gtm-vis-has-fired48430672_37="1" data-gtm-vis-has-fired48430672_468="1" data-gtm-vis-has-fired48430672_493="1" data-gtm-vis-has-fired48430672_501="1" data-gtm-vis-has-fired48430672_505="1" data-gtm-vis-has-fired48430672_506="1" data-gtm-vis-has-fired48430672_531="1">
<div class="col-1-13 [&amp;_*]:font-serif [&amp;_&gt;*:last-child]:mb-0 [&amp;_h2]:mt-8 [&amp;_h2]:mb-4 [&amp;_h2]:h-editorial-030 [&amp;_p]:break-words [&amp;_p]:my-4 [&amp;_p]:text-p sm:[&amp;_p]:my-6 [&amp;_ul]:my-4 [&amp;_ul]:text-p sm:[&amp;_ul]:my-6 [&amp;_ol]:my-4 [&amp;_ol]:text-p sm:[&amp;_ol]:my-6 [&amp;_p:last-of-type]:pb-0 [&amp;_p:last-of-type]:mb-0 [&amp;_a]:underline [&amp;_a]:text-accent-blue-shade [&amp;_a:active]:no-underline [&amp;_a:hover]:no-underline [&amp;_a:visited]:text-accent-blue-shade [&amp;_figure]:my-6 sm:[&amp;_figure]:my-10 [&amp;_figure_figcaption]:mt-2 [&amp;_figure_figcaption]:font-sans [&amp;_figure_figcaption]:leading-6 [&amp;_figure_figcaption]:text-caption sm:[&amp;_figure_figcaption]:mt-3 [&amp;_figure_figcaption],[&amp;_figure_figcaption_a],[&amp;_figure_figcaption_a:visited]:[&amp;_figure_figcaption]:text-soft-black-shade [&amp;_figure_figcaption_a],[&amp;_figure_figcaption_a:visited]:font-sans [&amp;_figure_figcaption_a]:underline [&amp;_figure&gt;img]:w-full [&amp;_blockquote:not(.instagram-media)]:pb-2 [&amp;_blockquote:not(.instagram-media)]:pl-8 [&amp;_blockquote:not(.instagram-media)]:mt-6 [&amp;_blockquote:not(.instagram-media)]:mb-0 [&amp;_blockquote:not(.instagram-media)]:italic [&amp;_blockquote:not(.instagram-media)]:border-l [&amp;_blockquote:not(.instagram-media)]:border-solid [&amp;_blockquote:not(.instagram-media)]:border-accent-blue-tint sm:[&amp;_blockquote:not(.instagram-media)]:mt-10 sm:[&amp;_blockquote:not(.instagram-media)]:pb-6 [&amp;_blockquote:not(.instagram-media)]:text-p [&amp;_blockquote:not(.instagram-media)]:margin-inline-start-0 [&amp;_blockquote:not(.instagram-media)]:margin-inline-end-0 [&amp;_blockquote+*]:mt-6 sm:[&amp;_blockquote+*]:mt-10 [&amp;_blockquote+cite]:inline-block [&amp;_blockquote+cite]:pt-0 [&amp;_blockquote+cite]:mt-0 [&amp;_blockquote+cite]:text-p [&amp;_blockquote+cite::before]:text-base sm:[&amp;_blockquote+cite::before]:text-caption [&amp;_blockquote+cite::before]:content-[&quot;&quot;] [&amp;_blockquote+blockquote]:pt-8 sm:[&amp;_blockquote+blockquote]:pt-6 [&amp;_blockquote+blockquote]:-mt-8 sm:[&amp;_blockquote+blockquote]:-mt-12 [&amp;_cite]:pl-8 [&amp;_cite]:border-l [&amp;_cite]:border-solid [&amp;_cite]:text-soft-black-shade [&amp;_cite]:border-accent-blue-tint [&amp;_cite]:text-p [&amp;_cite+*]:mt-6 sm:[&amp;_cite+*]:mt-10 [&amp;_strong]:font-bold [&amp;_u]:no-underline [&amp;_ol]:pl-0 [&amp;_ol]:list-decimal [&amp;_ol]:list-inside [&amp;_ul]:list-image-bullet-filled [&amp;_ul]:pt-0 [&amp;_ul]:pr-0 [&amp;_ul]:pb-0 [&amp;_ul]:pl-4.5 [&amp;_ul_li]:pl-2 [&amp;_ul_li:not(:last-of-type)]:mb-3 [&amp;_ul_ul]:list-image-bullet-outlined [&amp;_ul_li]:mt-4 sm:[&amp;_ul_li]:mt-6 [&amp;_ol_li]:mt-4 sm:[&amp;_ol_li]:mt-6 [&amp;_.iframe-responsive-wrapper]:pb-[56.25%] [&amp;_.iframe-responsive-wrapper]:relative [&amp;_.iframe-responsive-wrapper]:overflow-hidden [&amp;_.iframe-responsive-wrapper_iframe]:h-full [&amp;_.iframe-responsive-wrapper_iframe]:left-0 [&amp;_.iframe-responsive-wrapper_iframe]:absolute [&amp;_.iframe-responsive-wrapper_iframe]:top-0 [&amp;_.iframe-responsive-wrapper_iframe]:w-full [&amp;_.iframe-responsive-wrapper:has(&gt;iframe[src*=&quot;documentcloud.org&quot;])]:pb-[max(56.25%,500px)] [&amp;_iframe[src*=&quot;documentcloud.org&quot;]]:border [&amp;_iframe[src*=&quot;documentcloud.org&quot;]]:border-[#aaa] [&amp;_iframe[id*=&quot;datawrapper-chart&quot;]]:border-none [&amp;_iframe[id*=&quot;datawrapper-chart&quot;]]:min-w-full [&amp;_iframe[id*=&quot;datawrapper-chart&quot;]]:w-0 xl:[&amp;_iframe[id*=&quot;datawrapper-chart&quot;]]:min-h-[465px] [&amp;_img[src$=&quot;giphy.gif&quot;]]:mx-auto [&amp;_.twitter-tweet]:mx-auto [&amp;_.instagram-wrapper]:flex [&amp;_.instagram-wrapper]:justify-center [&amp;_.axios-visual-newsletter-fallback-image]:hidden sm:[&amp;_.axios-visual-newsletter-fallback-image]:block sm:[&amp;_.axios-visual-apple-fallback-image]:hidden [&amp;_div.subhead-timestamp]:-mt-15 [&amp;_div.subhead-timestamp]:pt-15 sm:[&amp;_div.subhead-timestamp]:-mt-20 sm:[&amp;_div.subhead-timestamp]:pt-20 [&amp;_div.subhead-timestamp_*]:font-sans [&amp;_div.subhead-timestamp_div]:flex [&amp;_div.subhead-timestamp_div]:gap-1 [&amp;_div.subhead-timestamp_a]:no-underline [&amp;_div.subhead-timestamp_a]:text-soft-black-shade [&amp;_div.subhead-timestamp_a_h2]:mt-0 &amp;.story-is-live [&amp;_div.subhead-timestamp_div_time]:text-red-core [&amp;_figure&gt;figcaption&gt;span]:font-sans" style="box-sizing: border-box; border: 0px solid; margin: 0px; padding: 0px; grid-column: 1 / 13;" data-chromatic="ignore">
<p>Google&#8217;s <a class="gtmContentClick" href="https://labs.google/flow/about" target="_blank" rel="noopener" data-vars-link-text="newest AI video generator" data-vars-click-url="https://www.axios.com/2025/05/20/google-ai-io-announcements-2025" data-vars-content-id="39fec3e2-9916-40e7-b04d-c887288beba2" data-vars-headline="Google's new AI video tool floods internet with real-looking clips" data-vars-event-category="story" data-vars-sub-category="story" data-vars-item="in_content_link">newest AI video generator</a>, Veo 3, generates clips that most users online can&#8217;t seem to distinguish from those made by human filmmakers and actors.</p>
<p><strong>Why it matters: </strong>Veo 3 videos shared online are amazing viewers with their realism — and also terrifying them with a sense that real and fake have become hopelessly blurred.</p>
<p><strong>The big picture: </strong>Unlike OpenAI&#8217;s video generator Sora, released more widely last December, Google DeepMind&#8217;s Veo 3 can include dialogue, soundtracks and sound effects.</p>
<ul>
<li>The model excels at following complex prompts and translating detailed descriptions into realistic videos.</li>
<li>The AI engine abides by real-world physics, offers accurate lip-syncing, rarely breaks continuity and generates people with lifelike human features, including five fingers per hand.</li>
<li>According to examples shared by Google and from users online, the telltale signs of synthetic content are mostly absent.</li>
</ul>
<p><strong>Case in point: </strong>In one viral example posted on X, filmmaker and molecular biologist Hashem Al-Ghaili shows a series of short films of AI-generated actors railing against their AI creators and prompts.</p>
<div></div>
<p><strong>Special effects technology,</strong> video-editing apps and camera tech advances have been changing Hollywood for many decades, but artificially generated films pose a novel challenge to human creators.</p>
<ul>
<li>In a promo video for Flow, Google&#8217;s new video tool that includes Veo 3, filmmakers say the AI engine gives them a new sense of freedom with a hint of eerie autonomy.</li>
<li>&#8220;It feels like it&#8217;s almost building upon itself,&#8221; filmmaker Dave Clark says.</li>
</ul>
<p><strong>How it works: </strong>Veo 3 was announced at Google I/O on Tuesday and is available now to $249-a-month Google AI Ultra subscribers in the United States.</p>
<p><iframe title="How to use Google Flow ai video generator | Flow Google’s new AI Filmmaking Tool" width="640" height="360" src="https://www.youtube.com/embed/B4Ullp0Qn8M?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><strong>Between the lines: </strong>Google says Veo 3 was &#8220;informed by our work with creators and filmmakers,&#8221; and some creators have embraced new AI tools. But the spread of the videos online is also dismaying many video professionals and lovers of art.</p>
<ul>
<li>Some dismiss any AI-generated video as &#8220;slop,&#8221; regardless of its technical proficiency or lifelike qualities — but, as Axios&#8217; Ina Fried points out, AI slop is in the eye of the beholder.</li>
</ul>
<div class="gtmView" data-vars-experiment="mid_story_ad" data-vars-experiment-variant="ad" data-vars-sub-category="non-braze" data-vars-product="core" data-vars-page-type="story" data-vars-sub-product="national" data-vars-latitude="33.84" data-vars-longitude="-117.6" data-vars-postal-code="92882" data-vars-event-name="cta_view" data-vars-deprecated-category="cta" data-vars-deprecated-experiment="mid_story_ad" data-vars-deprecated-experiment-variant="ad" data-vars-deprecated-label="cta/view/mid_story_ad/ad" data-gtm-vis-recent-on-screen48430672_493="56830864" data-gtm-vis-first-on-screen48430672_493="56830864" data-gtm-vis-total-visible-time48430672_493="1000" data-gtm-vis-recent-on-screen48430672_531="56830877" data-gtm-vis-first-on-screen48430672_531="56830877" data-gtm-vis-total-visible-time48430672_531="1000" data-gtm-vis-recent-on-screen48430672_506="56830877" data-gtm-vis-first-on-screen48430672_506="56830877" data-gtm-vis-total-visible-time48430672_506="1000" data-gtm-vis-recent-on-screen48430672_468="56830877" data-gtm-vis-first-on-screen48430672_468="56830877" data-gtm-vis-total-visible-time48430672_468="1000" data-gtm-vis-recent-on-screen48430672_501="56830877" data-gtm-vis-first-on-screen48430672_501="56830877" data-gtm-vis-total-visible-time48430672_501="1000" data-gtm-vis-recent-on-screen48430672_37="56830877" data-gtm-vis-first-on-screen48430672_37="56830877" data-gtm-vis-total-visible-time48430672_37="1000" data-gtm-vis-recent-on-screen48430672_505="56830877" data-gtm-vis-first-on-screen48430672_505="56830877" data-gtm-vis-total-visible-time48430672_505="1000" data-gtm-vis-has-fired48430672_493="1" data-gtm-vis-has-fired48430672_531="1" data-gtm-vis-has-fired48430672_506="1" data-gtm-vis-has-fired48430672_468="1" data-gtm-vis-has-fired48430672_501="1" data-gtm-vis-has-fired48430672_37="1" data-gtm-vis-has-fired48430672_505="1">
<div class="mt-6 mb-6">
<div class="gtmView midStoryAd grid justify-center items-center py-2 overflow-hidden lg:overflow-visible before:content-['Advertisement'] before:text-caption before:font-sans before:text-soft-black-shade before:mb-1 before:select-none before:text-center before:block" data-cy="mid-story-ad" data-vars-event-name="ad_view" data-vars-product="core" data-vars-page-type="story" data-vars-sub-product="national" data-vars-latitude="33.84" data-vars-longitude="-117.6" data-vars-postal-code="92882" data-vars-sub-category="mid_story" data-vars-content-id="39fec3e2-9916-40e7-b04d-c887288beba2" data-vars-headline="Google's new AI video tool floods internet with real-looking clips" data-gtm-vis-recent-on-screen48430672_493="56830864" data-gtm-vis-first-on-screen48430672_493="56830864" data-gtm-vis-total-visible-time48430672_493="1000" data-gtm-vis-recent-on-screen48430672_531="56830877" data-gtm-vis-first-on-screen48430672_531="56830877" data-gtm-vis-total-visible-time48430672_531="1000" data-gtm-vis-recent-on-screen48430672_506="56830877" data-gtm-vis-first-on-screen48430672_506="56830877" data-gtm-vis-total-visible-time48430672_506="1000" data-gtm-vis-recent-on-screen48430672_468="56830877" data-gtm-vis-first-on-screen48430672_468="56830877" data-gtm-vis-total-visible-time48430672_468="1000" data-gtm-vis-recent-on-screen48430672_501="56830877" data-gtm-vis-first-on-screen48430672_501="56830877" data-gtm-vis-total-visible-time48430672_501="1000" data-gtm-vis-recent-on-screen48430672_37="56830877" data-gtm-vis-first-on-screen48430672_37="56830877" data-gtm-vis-total-visible-time48430672_37="1000" data-gtm-vis-recent-on-screen48430672_505="56830877" data-gtm-vis-first-on-screen48430672_505="56830877" data-gtm-vis-total-visible-time48430672_505="1000" data-gtm-vis-has-fired48430672_493="1" data-gtm-vis-has-fired48430672_531="1" data-gtm-vis-has-fired48430672_506="1" data-gtm-vis-has-fired48430672_468="1" data-gtm-vis-has-fired48430672_501="1" data-gtm-vis-has-fired48430672_37="1" data-gtm-vis-has-fired48430672_505="1">
<div class="adunitContainer"></div>
</div>
</div>
</div>
<ul>
<li>The tool could also be useful for more commercial marketing and media work, AI analyst Ethan Mollick writes.</li>
</ul>
<p><strong>It&#8217;s unclear how Google trained Veo 3 </strong>and how that might affect the creativity of its outputs.</p>
<ul>
<li>404 Media found that Veo 3 generated the same lame dad joke for several users who prompted it to create a video of a man doing stand-up comedy.</li>
<li>Likewise, last year, YouTuber Marques Brownlee asked Sora to create a video of a &#8220;tech reviewer sitting at a desk.&#8221; The generated video featured a fake plant that&#8217;s nearly identical to the shrub Brownlee keeps on his desk for many of his videos — suggesting the tool may have been trained on them. <a href="https://www.axios.com/2025/05/23/google-ai-videos-veo-3" target="_blank" rel="noopener">source</a></li>
</ul>
</div>
</div>
<div class="gtmView" data-cy="social-share-bottom" data-vars-event-name="share_view" data-vars-content-id="39fec3e2-9916-40e7-b04d-c887288beba2" data-vars-headline="Google's new AI video tool floods internet with real-looking clips" data-vars-location="bottom" data-vars-latitude="33.84" data-vars-longitude="-117.6" data-vars-postal-code="92882" data-vars-product="core" data-vars-page-type="story" data-vars-sub-product="national" data-gtm-vis-recent-on-screen48430672_493="56832313" data-gtm-vis-first-on-screen48430672_493="56832313" data-gtm-vis-total-visible-time48430672_493="1000" data-gtm-vis-recent-on-screen48430672_531="56832313" data-gtm-vis-first-on-screen48430672_531="56832313" data-gtm-vis-total-visible-time48430672_531="1000" data-gtm-vis-recent-on-screen48430672_506="56832313" data-gtm-vis-first-on-screen48430672_506="56832313" data-gtm-vis-total-visible-time48430672_506="1000" data-gtm-vis-recent-on-screen48430672_468="56832313" data-gtm-vis-first-on-screen48430672_468="56832313" data-gtm-vis-total-visible-time48430672_468="1000" data-gtm-vis-recent-on-screen48430672_501="56832313" data-gtm-vis-first-on-screen48430672_501="56832313" data-gtm-vis-total-visible-time48430672_501="1000" data-gtm-vis-recent-on-screen48430672_37="56832313" data-gtm-vis-first-on-screen48430672_37="56832313" data-gtm-vis-total-visible-time48430672_37="1000" data-gtm-vis-recent-on-screen48430672_505="56832313" data-gtm-vis-first-on-screen48430672_505="56832313" data-gtm-vis-total-visible-time48430672_505="1000" data-gtm-vis-has-fired48430672_493="1" data-gtm-vis-has-fired48430672_531="1" data-gtm-vis-has-fired48430672_506="1" data-gtm-vis-has-fired48430672_468="1" data-gtm-vis-has-fired48430672_501="1" data-gtm-vis-has-fired48430672_37="1" data-gtm-vis-has-fired48430672_505="1"></div>
<p>&nbsp;</p>
<p><iframe title="Why FLOW.Google is the ABSOLUTE BEST AI Video Generator for 2025 and Beyond" width="640" height="360" src="https://www.youtube.com/embed/dxMyqUpPmkM?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
