<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Tech Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<atom:link href="https://goodshepherdmedia.net/category/truthful-news/tech/feed/" rel="self" type="application/rss+xml" />
	<link>https://goodshepherdmedia.net/category/truthful-news/tech/</link>
	<description>Christian, Political, ‎‏‏‎Social &#38; Legal Free Speech News &#124; Ⓒ2024 Good News Media LLC &#124; Shepherd for the Herd! God 1st Programming</description>
	<lastBuildDate>Tue, 16 Sep 2025 05:51:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://goodshepherdmedia.net/wp-content/uploads/2023/08/Good-Shepherd-News-Logo-150x150.png</url>
	<title>Tech Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<link>https://goodshepherdmedia.net/category/truthful-news/tech/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>PATRIOT Act Author The NSA Is Actively Violating The Law</title>
		<link>https://goodshepherdmedia.net/patriot-act-author-the-nsa-is-actively-violating-the-law/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Tue, 16 Sep 2025 05:51:38 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[14th Amendment]]></category>
		<category><![CDATA[1st Amendment]]></category>
		<category><![CDATA[4th Amendment]]></category>
		<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Legal News The Motivation]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Rights]]></category>
		<category><![CDATA[Science & Engineering]]></category>
		<category><![CDATA[Supreme Court - SCOTUS]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[PATRIOT Act]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21927</guid>

					<description><![CDATA[PATRIOT Act Author: The NSA Is Actively Violating The Law Jim Sensenbrenner (R-WI), the author of the original USA PATRIOT Act, disagrees. In a amicus brief filed in support of the American Civil Liberties Union&#8217;s lawsuit against the National Security Agency&#8217;s bulk collection of U.S. phone records, Sensenbrenner argues that the government has gone far beyond what the legislation authorizes. [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="headline heading-xl ">PATRIOT Act Author: The NSA Is Actively Violating The Law</h1>
<p>Jim Sensenbrenner (R-WI), the author of the original USA PATRIOT Act, disagrees.</p>
<p>In a amicus brief filed in support of the American Civil Liberties Union&#8217;s lawsuit against the National Security Agency&#8217;s bulk collection of U.S. phone records, Sensenbrenner argues that the government has gone far beyond what the legislation authorizes.</p>
<p class="p1">Section 215, known as the business records provision, authorizes intelligence agencies to apply for information if &#8220;the records are relevant to an ongoing foreign intelligence investigation.&#8221;</p>
<p class="p1">In practice, the NSA uses section 215 to collect data pertaining to every phone call to, from, and within the U.S. in the name of combating terrorism.</p>
<p class="p1">Sensenbrenner and the other members of Congress who enacted Section 215 &#8220;did not intend to authorize the program at issue in this lawsuit or any program of a comparable scope,&#8221; according to the brief.</p>
<p class="p1">The brief goes on to propose this question (emphasis ours):</p>
<p class="p1">The NSA is gathering on a daily basis the details of every call that every American makes, as well as every call made by foreigners to or from the United States. <strong>How can every call that every American makes or receives be relevant to a specific investigation?</strong>&#8220;</p>
<p class="p1">Filed by the Electronic Frontier Foundation, the brief notes that Sensenbrenner &#8220;was not aware of the full scope of the program when he voted to reauthorize Section 215&#8221; and would have voted against it if he had known.</p>
<p class="p1">In Sensenbrenner&#8217;s words: &#8220;The suggestion that the administration can violate the law because Congress failed to object is outrageous. But let them be on notice: I am objecting right now.&#8221;  <a href="https://www.businessinsider.com/patriot-act-author-nsa-abused-its-power-2013-9">source</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CNBC Reporter mentions iPhone to Steve Jobs before any iphone was ever released </title>
		<link>https://goodshepherdmedia.net/cnbc-reporter-mentions-iphone-to-steve-jobs-before-any-iphone-was-ever-released/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 01 Sep 2025 22:20:19 +0000</pubDate>
				<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[📱Mobile📱]]></category>
		<category><![CDATA[🙂Fun Facts🙂]]></category>
		<category><![CDATA[before any iphone was ever released]]></category>
		<category><![CDATA[CNBC Reporter mentions iPhone to Steve Job]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21758</guid>

					<description><![CDATA[Steve Jobs interviewed by CNBC Reporter mentions iPhone to Steve Jobs before any iphone was ever released  5th Ave Store Opening (CNBC) 18 May 2006 Some forgettable CNBC reporter who managed at least one interesting question of Steve Jobs concerning AMD. Jobs, looking thin and pixelated, and dressed in a black, long-sleeved shirt of indeterminate neck [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="dusk:text-gray-100 mb-3 px-[15px] font-serif text-3xl font-semibold leading-none text-gray-700 dark:text-gray-100 sm:px-5 md:px-0 md:text-4xl lg:text-5xl">Steve Jobs interviewed by CNBC <span class="yt-core-attributed-string yt-core-attributed-string--white-space-pre-wrap yt-core-attributed-string--link-inherit-color" dir="auto" role="text">Reporter mentions iPhone to Steve Jobs before any iphone was ever released </span></h1>
<p><iframe title="Steve Jobs CNBC Interview, 5th Ave. Apple Store" width="640" height="480" src="https://www.youtube.com/embed/y6BFhRkUJEI?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h1>5th Ave Store Opening (CNBC) <small>18 May 2006</small></h1>
<p>Some forgettable CNBC reporter who managed at least one interesting question of Steve Jobs concerning AMD. Jobs, looking thin and pixelated, and dressed in a black, long-sleeved shirt of indeterminate neck variety, was speaking from the within the new store on Fifth Avenue, in New York.</p>
<div class="ars-interlude-container in-content-interlude mx-auto max-w-xl my-5"></div>
<p>Most of the interview was about the new store and the retail initiative, which Jobs described as being a &#8220;success beyond our wildest dreams.&#8221; When queried over the expense of flagship stores, such as the SOHO store in New York, Jobs responded that Apple has &#8220;never believed in the philosophy that flagship stores don&#8217;t make money,&#8221; and they do. To that end, he suggested Apple&#8217;s first response to the idea of a store underneath the plaza outside the GM building was, &#8220;subterranean, are you crazy?&#8221; However, Apple responded with a &#8220;crazy&#8221; idea of their own, the now famous 32 foot glass cube and brand beacon to generate traffic. Jobs mentioned that of the 300 employees at the store, half will be available for tech support, even at 2:00 AM, and who wouldn&#8217;t want to stroll the plaza at that hour with a couple of thousands dollars worth of hardware? The CNBC reporter also asked about the iPhone and was correctly snubbed, but more interesting was the response to a question about AMD chips, one that is well-suited for Da Vinci Code type analysis by Mac nerds on the Internet guessing Apple&#8217;s next move. I transcribed as best I could, of course.</p>
<blockquote><p>You know AMD&#8217;s got some interesting products at the very high end of the server space, but the part of the market we concentrate on the most is notebooks and consumer desktops, and for that Intel&#8217;s got the best chips. This Yonah chip, the Core Duo that they have right now, is the best chip in the world for notebooks and consumer desktops, so right now Intel&#8217;s road map looks very, very strong for the kinds of products—processors—we need for the products we build.</p></blockquote>
<p>Many will note the &#8220;right now&#8221; phrase, but I am more intrigued by the tacit admission of the shift away from the tower as the flagship product of Apple Computer. Of course, the fact that Apple has yet to make the transition to Intel for the pro desktops says as much, but it&#8217;s still strange to hear from the CEO&#8217;s mouth.</p>
<p><a href="https://arstechnica.com/gadgets/2006/05/4047/" target="_blank" rel="noopener">source</a></p>
<p><iframe title="Reporter mentions iPhone to Steve Jobs before it was even a thing, 2006" width="540" height="960" src="https://www.youtube.com/embed/aNgN5fnbk3o?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Researchers quietly planned a test to dim sunlight. They wanted to ‘avoid scaring’ the public.</title>
		<link>https://goodshepherdmedia.net/researchers-quietly-planned-a-test-to-dim-sunlight-they-wanted-to-avoid-scaring-the-public/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Sun, 31 Aug 2025 21:03:42 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Disaster]]></category>
		<category><![CDATA[Health]]></category>
		<category><![CDATA[Legal News The Motivation]]></category>
		<category><![CDATA[Man Made]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[Researchers quietly planned a test to dim sunlight]]></category>
		<category><![CDATA[Scientists Secretly Working on Plan to Test Blocking Sun From Huge Area of Earth]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21433</guid>

					<description><![CDATA[Researchers quietly planned a test to dim sunlight. They wanted to ‘avoid scaring’ the public. Hundreds of documents show how researchers failed to notify officials in California about a test of technology to block the sun’s rays — while they planned a much huger sequel. &#160; The west coast of North America is one area [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="mt-2 text-2xl font-bold leading-[1.12] tracking-[-.02rem] sm:leading-none sm:tracking-[-.05rem] md:text-[1.75rem] lg:text-[2.5rem]" data-testid="title">Researchers quietly planned a test to dim sunlight. They wanted to ‘avoid scaring’ the public.</h1>
<p class="mb-4 mt-2 text-sm leading-[1.4] text-gray-vulcan-44 md:text-base md:leading-[1.4] font-text">Hundreds of documents show how researchers failed to notify officials in California about a test of technology to block the sun’s rays — while they planned a much huger sequel.</p>
<p>&nbsp;</p>
<p><iframe title="Sun-Blocking Plot BUSTED: Secret California Weather Scheme HIDDEN from Public!!" width="640" height="360" src="https://www.youtube.com/embed/jZVNSJvtlzw?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>The west coast of North America is one area the Marine Cloud Brightening Program has considered for a 3,900-square-mile solar geoengineering test. A boat is seen off the coast of Costa Rica. | Yuri Cortez/AFP via Getty Images</p>
<p class="is-first-paragraph font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">A team of researchers in California drew notoriety last year with an aborted experiment on a retired aircraft carrier that sought to test a machine for creating clouds.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">But behind the scenes, they were planning a much larger and potentially riskier study of salt-water-spraying equipment that could eventually be used to dim the sun’s rays — a multimillion-dollar project aimed at producing clouds over a stretch of ocean larger than Puerto Rico.</p>
<div class="mx-auto max-w-[1350px] gap-x-[30px] px-5 text-center sm:px-[30px] md:grid md:grid-cols-[1fr,300px] lg:grid-cols-[300px,1fr,300px]">
<div class="mx-auto w-full max-w-[630px] text-left !w-full">
<div class="article-lead">
<div class="">
<div class="mx-auto max-w-[630px]">
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">The details outlined in funding requests, emails, texts and other records obtained by POLITICO’s E&amp;E News raise new questions about a secretive <a class="js-tealium-tracking" href="https://www.politico.com/news/2024/06/19/flubbed-climate-test-rich-donors-altering-sky-00164011" data-tracking="mpos=center&amp;mid=ar_body&amp;lindex=4&amp;lcol=">billionaire-backed initiative</a> that oversaw last year’s brief solar geoengineering experiment on the San Francisco Bay.</p>
</div>
</div>
</div>
</div>
</div>
<div class="mx-auto max-w-[1350px] gap-x-[30px] px-5 text-center sm:px-[30px] md:grid md:grid-cols-[1fr,300px] lg:grid-cols-[300px,1fr,300px]">
<div class="mx-auto w-full max-w-[630px] text-left">
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">They also offer a rare glimpse into the vast scope of research aimed at finding ways to counter the Earth’s warming, work that has often occurred outside public view. Such research is drawing increased interest at a time when efforts to address the root cause of climate change — burning fossil fuels — are facing setbacks in the U.S. and Europe. But the notion of human tinkering with the weather and climate has drawn a political backlash and generated conspiracy theories, adding to the challenges of mounting even small-scale tests.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">Last year’s experiment, led by the University of Washington and intended to run for months, lasted about 20 minutes before being <a class="js-tealium-tracking" href="https://www.politico.com/news/2024/06/05/california-geoengineering-blocked-00161733" data-tracking="mpos=center&amp;mid=ar_body&amp;lindex=5&amp;lcol=">shut down by Alameda city officials</a> who objected that nobody had told them about it beforehand.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">That initial test was only meant to be a prequel. Even before it began, the researchers were talking with donors and consultants about conducting a 3,900-square-mile cloud-creation test off the west coasts of North America, Chile or south-central Africa, according to more than 400 internal documents obtained by E&amp;E News through an open records request to the University of Washington.</p>
</div>
</div>
<div class="mx-auto max-w-[1350px] gap-x-[30px] px-5 text-center sm:px-[30px] md:grid md:grid-cols-[1fr,300px] lg:grid-cols-[300px,1fr,300px]">
<div class="mx-auto w-full max-w-[630px] text-left">
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">“At such scales, meaningful changes in clouds will be readily detectable from space,” said a 2023 <a href="https://www.documentcloud.org/documents/25933857-20651572-20651572/">research plan</a> from the university’s Marine Cloud Brightening Program. The massive experiment would have been contingent upon the successful completion of the thwarted pilot test on the carrier deck in Alameda, according to the plan. The records offer no indication of whether the researchers or their billionaire backers have since abandoned the larger project.</p>
<aside class="order-2 mx-auto mt-[0.9375rem] block text-left md:mt-[1.875rem] container">
<figure class=""><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-21438" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/webp-2.webp" alt="" width="618" height="172" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/webp-2.webp 618w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/webp-2-400x111.webp 400w" sizes="(max-width: 618px) 100vw, 618px" /><figcaption class="mt-2.5 text-sm leading-[1.3] text-gray-vulcan-44">A section of the Marine Cloud Brightening Program’s 2023 research plan is shown.  |  University of Washington</figcaption></figure>
</aside>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">Before the setback in Alameda, the team had received some federal funding and hoped to gain access to government ships and planes, the documents show.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">The university and its partners — a solar geoengineering research advocacy group called SilverLining and the scientific nonprofit SRI International — didn’t respond to detailed questions about the status of the larger cloud experiment. But SilverLining’s executive director, Kelly Wanser, said in an email that the Marine Cloud Brightening Program aimed to “fill gaps in the information” needed to determine if the technologies are safe and effective.</p>
</div>
</div>
<div class="max-w-[100%] p-0">
<div class="pt-[2.375rem] sm:pt-5 md:pt-[1.875rem]">
<div id="banner_btf_202-wrap" class="content-group ad relative before:inset-0 before:right-0 before:z-10 before:block before:w-full before:pb-2.5 before:text-center before:text-sm before:leading-[1.05rem] before:text-gray-vulcan-44 before:content-[attr(data-ad-label)]" data-ad-label="Advertisement" aria-label="Advertisement">
<div id="banner_btf_202_rlWr" aria-hidden="true" data-target="pos=202">
<div id="banner_btf_202" class="" aria-hidden="true" data-target="pos=202">In the initial experiment, the researchers appeared to have disregarded past lessons about building community support for studies related to altering the climate, and instead kept their plans from the public and lawmakers until the testing was underway, some solar geoengineering experts told E&amp;E News. The experts also expressed surprise at the size of the planned second experiment.</div>
</div>
</div>
</div>
</div>
<div class="mx-auto max-w-[1350px] gap-x-[30px] px-5 text-center sm:px-[30px] md:grid md:grid-cols-[1fr,300px] lg:grid-cols-[300px,1fr,300px]">
<div class="mx-auto w-full max-w-[630px] text-left">
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">“Alameda was a stepping stone to something much larger, and there wasn’t any engagement with local communities,” said Sikina Jinnah, an environmental studies professor at the University of California, Santa Cruz. “That’s a serious misstep.”</p>
<aside class="order-2 mx-auto mt-[0.9375rem] block text-left md:mt-[1.875rem] container">
<figure class=""><picture><source srcset="https://www.politico.com/dims4/default/resize/280/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2F32%2Fc3%2F7fa2fe2e4603a0a673b4f2ebf985%2Fhttps-delivery-gettyimages.com%2Fdownloads%2F2183582307 280w, https://www.politico.com/dims4/default/resize/560/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2F32%2Fc3%2F7fa2fe2e4603a0a673b4f2ebf985%2Fhttps-delivery-gettyimages.com%2Fdownloads%2F2183582307 560w, https://www.politico.com/dims4/default/resize/630/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2F32%2Fc3%2F7fa2fe2e4603a0a673b4f2ebf985%2Fhttps-delivery-gettyimages.com%2Fdownloads%2F2183582307 630w, https://www.politico.com/dims4/default/resize/1260/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2F32%2Fc3%2F7fa2fe2e4603a0a673b4f2ebf985%2Fhttps-delivery-gettyimages.com%2Fdownloads%2F2183582307 1260w" type="image/webp" sizes="(max-width: 320px) 280px, (min-width: 321px) 630px" /><img decoding="async" class="aspect-image-3x2 w-full" src="https://www.politico.com/dims4/default/resize/630/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2F32%2Fc3%2F7fa2fe2e4603a0a673b4f2ebf985%2Fhttps-delivery-gettyimages.com%2Fdownloads%2F2183582307" alt="Sarah Doherty." /></picture><figcaption class="mt-2.5 text-sm leading-[1.3] text-gray-vulcan-44">Sarah Doherty, an associate professor of atmospheric sciences at the University of Washington, is the director of the Marine Cloud Brightening Program.  |  Mat Hayward/Getty Images for Hip Hop Climate Conference</figcaption></figure>
</aside>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">In response to questions, University of Washington officials downplayed the magnitude of the proposed experiment and its potential to change weather patterns. Instead, they focused on the program’s goal of showing that the instruments for making clouds could work in a real-world setting. They also pushed back on critics’ assertions that they were operating secretively, noting that team members had previously disclosed the potential for open-ocean testing in <a href="https://link.springer.com/article/10.1007/s10584-013-0932-z">scientific papers</a>.</p>
</div>
</div>
<div class="max-w-[100%] p-0">
<div class="pt-[2.375rem] sm:pt-5 md:pt-[1.875rem]">
<div id="banner_btf_203-wrap" class="content-group ad relative before:inset-0 before:right-0 before:z-10 before:block before:w-full before:pb-2.5 before:text-center before:text-sm before:leading-[1.05rem] before:text-gray-vulcan-44 before:content-[attr(data-ad-label)]" data-ad-label="Advertisement" aria-label="Advertisement">
<div id="banner_btf_203_rlWr" aria-hidden="true" data-target="pos=203">
<div id="banner_btf_203_slotSpacer" class="slotSpacer">The program does not “recommend, support or develop plans for the use of marine cloud brightening to alter weather or climate,” Sarah Doherty, an atmospheric and climate science professor at the university who leads the program, said in a statement to E&amp;E News. She emphasized that the program remains focused on researching the technology, not deploying it. There are no “plans for conducting large-scale studies that would alter weather or climate,” she added.</div>
</div>
</div>
</div>
</div>
<div class="mx-auto max-w-[1350px] gap-x-[30px] px-5 text-center sm:px-[30px] md:grid md:grid-cols-[1fr,300px] lg:grid-cols-[300px,1fr,300px]">
<div class="mx-auto w-full max-w-[630px] text-left">
<h2 class="mt-[1.25rem] md:mt-[1.875rem] text-3xl" data-v-b1186a93="">Growing calls for regulation</h2>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">Solar geoengineering encompasses a suite of hypothetical technologies and processes for reducing global warming by reflecting sunlight away from the Earth that are largely unregulated at the federal level. The two most researched approaches include releasing sulfate particles in the stratosphere or spraying saltwater aerosols over the ocean.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93=""><a href="https://www.sierraclub.org/sierra/2023-3-fall/stress-test/solar-geoengineering-could-wreak-havoc-planet">But critics of the technologies warn</a> that they could also disrupt weather patterns — potentially affecting farm yields, wildlife and people. Even if they succeed in cooling the climate, temperatures could spike upward if the processes are abruptly shut down before countries have transitioned away from burning planet-warming fossil fuels, an outcome described by experts as “termination shock.”</p>
</div>
</div>
<div class="max-w-[100%] p-0">
<div class="pt-[2.375rem] sm:pt-5 md:pt-[1.875rem]">
<div id="banner_btf_204-wrap" class="content-group ad relative before:inset-0 before:right-0 before:z-10 before:block before:w-full before:pb-2.5 before:text-center before:text-sm before:leading-[1.05rem] before:text-gray-vulcan-44 before:content-[attr(data-ad-label)]" data-ad-label="Advertisement" aria-label="Advertisement">
<div id="banner_btf_204_rlWr" aria-hidden="true" data-target="pos=204">
<div id="banner_btf_204_slotSpacer" class="slotSpacer">As a result, even researching them is controversial — and conspiracy theories driven by weather tragedies have worsened the backlash.</div>
</div>
</div>
</div>
</div>
<div class="mx-auto max-w-[1350px] gap-x-[30px] px-5 text-center sm:px-[30px] md:grid md:grid-cols-[1fr,300px] lg:grid-cols-[300px,1fr,300px]">
<div class="mx-auto w-full max-w-[630px] text-left">
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">Rep. Marjorie Taylor Greene (R-Ga.) has erroneously suggested that geoengineering is responsible for the deadly July 4 flood in Texas and introduced a bill to criminalize the technology. Retired Lt. Gen. Mike Flynn, a former national security adviser to President Donald Trump, has <a href="https://x.com/GenFlynn/status/1941945913439564175">embraced similar untruths</a>.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">Meanwhile, more than 575 scientists have called for a <a href="https://www.solargeoeng.org/non-use-agreement/open-letter/">ban on geoengineering development</a> because it “cannot be governed globally in a fair, inclusive, and effective manner.” And in Florida, Republican Gov. Ron DeSantis signed a law last month that bans the injection or release of chemicals into the atmosphere “for the express purpose of affecting the temperature, weather, climate, or intensity of sunlight.”</p>
<aside class="order-2 mx-auto mt-[0.9375rem] block text-left md:mt-[1.875rem] container">
<figure class=""><picture><source srcset="https://www.politico.com/dims4/default/resize/280/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2Fc6%2Fb2%2F1af7e0c54f87b095ca748f6c7dfe%2Fu-s-congress-70222.jpg 280w, https://www.politico.com/dims4/default/resize/560/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2Fc6%2Fb2%2F1af7e0c54f87b095ca748f6c7dfe%2Fu-s-congress-70222.jpg 560w, https://www.politico.com/dims4/default/resize/630/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2Fc6%2Fb2%2F1af7e0c54f87b095ca748f6c7dfe%2Fu-s-congress-70222.jpg 630w, https://www.politico.com/dims4/default/resize/1260/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2Fc6%2Fb2%2F1af7e0c54f87b095ca748f6c7dfe%2Fu-s-congress-70222.jpg 1260w" type="image/webp" sizes="(max-width: 320px) 280px, (min-width: 321px) 630px" /><img decoding="async" class="aspect-image-3x2 w-full" src="https://www.politico.com/dims4/default/resize/630/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2Fc6%2Fb2%2F1af7e0c54f87b095ca748f6c7dfe%2Fu-s-congress-70222.jpg" alt="EPA Administrator Lee Zeldin speaks at EPA headquarters." /></picture><figcaption class="mt-2.5 text-sm leading-[1.3] text-gray-vulcan-44">Administrator Lee Zeldin has said “the Trump EPA is committed to total transparency” around geoengineering and contrails.  |  Francis Chung/POLITICO</figcaption></figure>
</aside>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">Conspiracy theories involving the weather have reached enough of a pitch that EPA Administrator Lee Zeldin released a tranche of information this month debunking the decades-old claim that jet planes intentionally release dangerous chemicals in their exhaust to alter the weather or control people’s minds.</p>
</div>
</div>
<div class="max-w-[100%] p-0">
<div class="pt-[2.375rem] sm:pt-5 md:pt-[1.875rem]">
<div id="banner_btf_205-wrap" class="content-group ad relative before:inset-0 before:right-0 before:z-10 before:block before:w-full before:pb-2.5 before:text-center before:text-sm before:leading-[1.05rem] before:text-gray-vulcan-44 before:content-[attr(data-ad-label)]" data-ad-label="Advertisement" aria-label="Advertisement">
<div id="banner_btf_205_rlWr" aria-hidden="true" data-target="pos=205">
<div id="banner_btf_205_slotSpacer" class="slotSpacer">The small Alameda experiment was one of several outdoor solar geoengineering studies that have been halted in recent years due to concerns that organizers had failed to consult with local communities. The City Council voted to block the sprayer test in June 2024 after Mayor Marilyn Ezzy Ashcraft, a Democrat, complained that she had first learned about it by reading a <a href="https://www.nytimes.com/2024/04/02/climate/global-warming-clouds-solar-geoengineering.html"><i>New York Times</i></a> article.</div>
</div>
</div>
</div>
</div>
<div class="mx-auto max-w-[1350px] gap-x-[30px] px-5 text-center sm:px-[30px] md:grid md:grid-cols-[1fr,300px] lg:grid-cols-[300px,1fr,300px]">
<div class="mx-auto w-full max-w-[630px] text-left">
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">The Alameda officials’ sharp reaction echoed responses to past blunders by other geoengineering researchers. An experiment in Sweden’s Arctic region that sought to release reflective particles in the stratosphere was canceled in 2021 after Indigenous people and environmentalists accused Harvard University of sidelining them. The entire program, known as SCoPEx, was terminated last year.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">“It’s absolutely imperative to engage with both local communities and broader publics around not just the work that is being proposed or is being planned, but also the broader implications of that work,” said Jinnah, the UC Santa Cruz professor, who served on the advisory board for SCoPEx.</p>
</div>
</div>
<div class="max-w-[100%] p-0">
<div class="pt-[2.375rem] sm:pt-5 md:pt-[1.875rem]">
<div id="banner_btf_206-wrap" class="content-group ad relative before:inset-0 before:right-0 before:z-10 before:block before:w-full before:pb-2.5 before:text-center before:text-sm before:leading-[1.05rem] before:text-gray-vulcan-44 before:content-[attr(data-ad-label)]" data-ad-label="Advertisement" aria-label="Advertisement">
<div id="banner_btf_206_rlWr" aria-hidden="true" data-target="pos=206">
<div id="banner_btf_206_slotSpacer" class="slotSpacer">That view isn’t universally shared in the solar geoengineering research community. Some scientists believe that the perils of climate change are too dire to not pursue the technology, which they say can be safely tested in well-designed experiments, such as the one in Alameda.</div>
</div>
</div>
</div>
</div>
<div class="mx-auto max-w-[1350px] gap-x-[30px] px-5 text-center sm:px-[30px] md:grid md:grid-cols-[1fr,300px] lg:grid-cols-[300px,1fr,300px]">
<div class="mx-auto w-full max-w-[630px] text-left">
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">“If we really were serious about the idea that to do any controversial topic needs some kind of large-scale consensus before we can research the topic, I think that means we don’t research topics,” David Keith, a geophysical sciences professor at the University of Chicago, said at a <a href="https://www.youtube.com/live/54Nc89hp3U0">think tank discussion</a> last month. Keith previously helped lead the canceled Harvard experiment.</p>
<h2 class="mt-[1.25rem] md:mt-[1.875rem] text-3xl" data-v-b1186a93="">Team sought U.S. ships, planes and funding</h2>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">The trove of documents shows that officials with the Marine Cloud Brightening Program were in contact with officials from NOAA and the consulting firm Accenture as the researchers prepared for the much larger ocean test — even before the small field test had begun on the retired aircraft carrier USS Hornet. They had hoped to gain access to U.S. government ships, planes and research funding for the major experiment at sea. (NOAA did not respond to a request for comment.)</p>
</div>
</div>
<div class="max-w-[100%] p-0">
<div class="pt-[2.375rem] sm:pt-5 md:pt-[1.875rem]">
<div id="banner_btf_207-wrap" class="content-group ad relative before:inset-0 before:right-0 before:z-10 before:block before:w-full before:pb-2.5 before:text-center before:text-sm before:leading-[1.05rem] before:text-gray-vulcan-44 before:content-[attr(data-ad-label)]" data-ad-label="Advertisement" aria-label="Advertisement">
<div id="banner_btf_207_rlWr" aria-hidden="true" data-target="pos=207"></div>
</div>
</div>
</div>
<div class="mx-auto max-w-[1350px] gap-x-[30px] px-5 text-center sm:px-[30px] md:grid md:grid-cols-[1fr,300px] lg:grid-cols-[300px,1fr,300px]">
<div class="mx-auto w-full max-w-[630px] text-left">After local backlash doomed the Alameda test, the team acknowledged that those federal resources were likely out of reach. The prospect of U.S. backing became more distant with the reelection of Trump, who opposes federal support for <a href="https://www.politico.com/news/2025/02/21/trump-gutted-climate-policy-across-federal-government-00204998">measures to limit global warming</a>. (The White House didn’t respond to a request for comment.)</div>
<div class="mx-auto w-full max-w-[630px] text-left">
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93=""><a href="https://atmos.uw.edu/faculty-and-research/marine-cloud-brightening-program/our-team-partners-and-funders/">The program’s donors</a> include cryptocurrency billionaire Chris Larsen, the philanthropist Rachel Pritzker and Chris Sacca, a venture capitalist who has appeared on <i>Shark Tank</i> and other TV shows. (Pritzker and Sacca didn’t respond to requests for comment.)</p>
<aside class="order-2 mx-auto mt-[0.9375rem] block text-left md:mt-[1.875rem] container">
<figure class=""><picture><source srcset="https://www.politico.com/dims4/default/resize/280/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2F6e%2Ff6%2F13edfcc24d5187872acab5eb7a8d%2Fhttps-delivery-gettyimages.com%2Fdownloads%2F495486474 280w, https://www.politico.com/dims4/default/resize/560/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2F6e%2Ff6%2F13edfcc24d5187872acab5eb7a8d%2Fhttps-delivery-gettyimages.com%2Fdownloads%2F495486474 560w, https://www.politico.com/dims4/default/resize/630/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2F6e%2Ff6%2F13edfcc24d5187872acab5eb7a8d%2Fhttps-delivery-gettyimages.com%2Fdownloads%2F495486474 630w, https://www.politico.com/dims4/default/resize/1260/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2F6e%2Ff6%2F13edfcc24d5187872acab5eb7a8d%2Fhttps-delivery-gettyimages.com%2Fdownloads%2F495486474 1260w" type="image/webp" sizes="(max-width: 320px) 280px, (min-width: 321px) 630px" /><img decoding="async" class="aspect-image-3x2 w-full" src="https://www.politico.com/dims4/default/resize/630/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2F6e%2Ff6%2F13edfcc24d5187872acab5eb7a8d%2Fhttps-delivery-gettyimages.com%2Fdownloads%2F495486474" alt="Chris Sacca." /></picture><figcaption class="mt-2.5 text-sm leading-[1.3] text-gray-vulcan-44">Chris Sacca, a billionaire venture capitalist, has financially supported the Marine Cloud Brightening Program.  |  Neilson Barnard/Getty Images for New York Times</figcaption></figure>
</aside>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">Larsen said research of marine cloud brightening is needed due to questions about the effectiveness and impacts of the technology. “At a time when scientists are facing political attacks and drastic funding cuts, we need to complement a rapid energy transition with more research into a broad range of potential climate solutions,” he wrote in an email to E&amp;E News.</p>
</div>
</div>
<div class="max-w-[100%] p-0">
<div class="pt-[2.375rem] sm:pt-5 md:pt-[1.875rem]">
<div id="banner_btf_208-wrap" class="content-group ad relative before:inset-0 before:right-0 before:z-10 before:block before:w-full before:pb-2.5 before:text-center before:text-sm before:leading-[1.05rem] before:text-gray-vulcan-44 before:content-[attr(data-ad-label)]" data-ad-label="Advertisement" aria-label="Advertisement">
<div id="banner_btf_208_rlWr" aria-hidden="true" data-target="pos=208"></div>
</div>
</div>
</div>
<div class="mx-auto max-w-[1350px] gap-x-[30px] px-5 text-center sm:px-[30px] md:grid md:grid-cols-[1fr,300px] lg:grid-cols-[300px,1fr,300px]">
<div class="mx-auto w-full max-w-[630px] text-left">
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">The 2023 research plan shows that the experiments in Alameda and at sea would have cost between $10 million and $20 million, with “large uncertainties” due to operational or government funding challenges and the potential to expand the “field studies to multiple geographic locations.”</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">They would require “significant cash at the outset” and continued support over several years, the plan said. It was submitted as part of a funding request to the Quadrature Climate Foundation, a charity associated with the London-based hedge fund Quadrature Capital.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">The Quadrature foundation told E&amp;E News it had given nearly $11.9 million to SilverLining and $5 million to the University of Washington for research on solar geoengineering, which is also known as solar radiation management, or SRM.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">“Public and philanthropic institutions have a role in developing the knowledge needed to assess approaches like SRM,” Greg De Temmerman, the foundation’s chief science officer, said in a statement. The goal is to ensure that decisions about the potential use of the technologies “are made responsibly, transparently, and in the public interest.”</p>
<h2 class="mt-[1.25rem] md:mt-[1.875rem] text-3xl" data-v-b1186a93="">‘Avoid scaring them’</h2>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">For more than a dozen years, the University of Washington has been studying marine cloud brightening to see if the potential cooling effects are worth the risks, the research team told Quadrature.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">“The MCB Program was formed in 2012 and operated as a largely unfunded collaboration until 2019, when modest philanthropic funding supported the commencement of dedicated effort,” the plan said.</p>
<aside class="order-2 mx-auto mt-[0.9375rem] block text-left md:mt-[1.875rem] container">
<figure class=""><picture><source srcset="https://www.politico.com/dims4/default/resize/280/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2F39%2F45%2F8063715f40ee9cd6eed8879a4f52%2Fhttps-delivery-gettyimages.com%2Fdownloads%2F1205529929 280w, https://www.politico.com/dims4/default/resize/560/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2F39%2F45%2F8063715f40ee9cd6eed8879a4f52%2Fhttps-delivery-gettyimages.com%2Fdownloads%2F1205529929 560w, https://www.politico.com/dims4/default/resize/630/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2F39%2F45%2F8063715f40ee9cd6eed8879a4f52%2Fhttps-delivery-gettyimages.com%2Fdownloads%2F1205529929 630w, https://www.politico.com/dims4/default/resize/1260/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2F39%2F45%2F8063715f40ee9cd6eed8879a4f52%2Fhttps-delivery-gettyimages.com%2Fdownloads%2F1205529929 1260w" type="image/webp" sizes="(max-width: 320px) 280px, (min-width: 321px) 630px" /><img decoding="async" class="aspect-image-3x2 w-full" src="https://www.politico.com/dims4/default/resize/630/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2F39%2F45%2F8063715f40ee9cd6eed8879a4f52%2Fhttps-delivery-gettyimages.com%2Fdownloads%2F1205529929" alt="Students walk along the University of Washington campus in Seattle." /></picture><figcaption class="mt-2.5 text-sm leading-[1.3] text-gray-vulcan-44">Students are seen at the University of Washington campus in Seattle, where the Marine Cloud Brightening Program is based.  |  Karen Ducey/Getty Images</figcaption></figure>
</aside>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">The source of the program’s initial financial support isn’t named in the document. But the timing coincides with the establishment of SilverLining, which is six years old.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">SilverLining reported <a href="https://projects.propublica.org/nonprofits/organizations/371908884/202433169349303708/full">more than $3.6 million in revenues in 2023</a>, the most recent year for which its tax filings are publicly available. The group does not disclose its full list of donors, although charities linked to <a href="https://projects.propublica.org/nonprofits/organizations/137298842/202403189349101555/IRS990PF">former Democratic New York Gov. Eliot Spitzer</a> and the late <a href="https://projects.propublica.org/nonprofits/organizations/943397785/202323189349106572/full">Gordon Moore</a>, a co-founder of the chipmaker Intel, have reported six-figure contributions to the group.  (The Bernard and Anne Spitzer Charitable Trust didn’t respond to a request for comment.)</p>
</div>
</div>
<div class="mx-auto max-w-[1350px] gap-x-[30px] px-5 text-center sm:px-[30px] md:grid md:grid-cols-[1fr,300px] lg:grid-cols-[300px,1fr,300px]">
<div class="mx-auto w-full max-w-[630px] text-left">
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">“The Moore Foundation is not involved in the Marine Cloud Brightening Program,” said Holly Potter, a spokesperson for the charity, adding that “solar geoengineering research in not a focus of the foundation’s work.”</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">The program pitched Quadrature and other donors on the idea that its need for private philanthropy was only temporary. Public support would eventually arrive for solar geoengineering research, the team argued.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">In a 2021 update for supporters, the team said it had received $1 million over two years <a href="https://cpo.noaa.gov/atmospheric-aerosols-and-their-potential-roles-in-solar-climate-intervention-methods/">from NOAA</a> and the <a href="https://asr.science.energy.gov/projects/13291">Department of Energy</a> for modeling studies and had begun work on the modified snow-making machine that the researchers would later test in Alameda. That technology is also being used in a field trial along the Great Barrier Reef that’s <a href="https://www.barrierreef.org/news/news/taking-to-the-skies-to-shade-corals">funded in part by the Australian government</a>.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">At the same time, the <a href="https://www.documentcloud.org/documents/25878955-20649739-20649739/">donor report</a> acknowledged the potential for “public perception challenges” like those that would later short-circuit the Alameda field test. “The MCB Program is well-positioned both in terms of its government ties, scientific analogues and careful positioning to move forward successfully, but this remains a risk.”</p>
</div>
</div>
<div class="mx-auto max-w-[1350px] gap-x-[30px] px-5 text-center sm:px-[30px] md:grid md:grid-cols-[1fr,300px] lg:grid-cols-[300px,1fr,300px]">
<div class="mx-auto w-full max-w-[630px] text-left">
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">The plan for Alameda included elements to engage the public. The deck of the USS Hornet, which is now a naval museum, remained open to visitors.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">But the team relied on museum staff to manage relations with Alameda leaders and carefully controlled the information it provided to the public, according to the documents provided by the University of Washington that included communications among the program leaders.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">“We think it’s safest to get air quality review help and are pursuing that in advance of engaging, but I’d avoid scaring them overly,” said an <a href="https://www.documentcloud.org/documents/25933978-20640921-20640921/">Aug. 23, 2023, text message</a> before a meeting with Hornet officials. “We want them to work largely on the assumption that things are a go.” No names were attached to the messages.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">Then in November 2023, a climate solutions reporter from National Public Radio was planning to visit the headquarters of SRI for a story about the importance of aerosols research. A communications strategist who worked for SilverLining at the time <a href="https://www.documentcloud.org/documents/25878893-20639795-20639795/?mode=document">emailed the team a clear directive</a>: “There will be no mention of the study taking place in Alameda,” wrote Jesus Chavez, the founder of the public relations firm Singularity Media, in bold, underlined text. (Chavez didn’t respond to a request for comment.)</p>
<aside class="order-2 mx-auto mt-[0.9375rem] block text-left md:mt-[1.875rem] container">
<figure class=""><img decoding="async" class="alignnone size-full wp-image-21437" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/webp-1.webp" alt="" width="618" height="221" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/webp-1.webp 618w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/webp-1-400x143.webp 400w" sizes="(max-width: 618px) 100vw, 618px" /><figcaption class="mt-2.5 text-sm leading-[1.3] text-gray-vulcan-44">A November 2023 email from a SilverLining communications strategist to the team, directing them to not mention the Alameda study to an NPR reporter who was covering the Marine Cloud Brightening Program.  |  University of Washington</figcaption></figure>
</aside>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">At the same time, the program was closely coordinating with government scientists, documents show.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">The head of NOAA’s chemical sciences division was one of three “VIPs” who were scheduled to visit the headquarters of SRI for a demonstration of a cloud-making machine, according to a December 2023 email from Wanser of SilverLining. Other guests included a dean from the University of Washington and an official from the private investment office of billionaire philanthropist Bill Gates, a longtime <a href="https://www.theguardian.com/environment/2012/feb/06/bill-gates-climate-scientists-geoengineering">supporter of geoengineering research</a>. (Gates Ventures didn’t respond to a request for comment.)</p>
</div>
</div>
<div class="max-w-[100%] p-0">
<div class="pt-[2.375rem] sm:pt-5 md:pt-[1.875rem]">
<div id="banner_btf_211-wrap" class="content-group ad relative before:inset-0 before:right-0 before:z-10 before:block before:w-full before:pb-2.5 before:text-center before:text-sm before:leading-[1.05rem] before:text-gray-vulcan-44 before:content-[attr(data-ad-label)]" data-ad-label="Advertisement" aria-label="Advertisement">
<div id="banner_btf_211_rlWr" aria-hidden="true" data-target="pos=211"></div>
</div>
</div>
</div>
<div class="mx-auto max-w-[1350px] gap-x-[30px] px-5 text-center sm:px-[30px] md:grid md:grid-cols-[1fr,300px] lg:grid-cols-[300px,1fr,300px]">
<div class="mx-auto w-full max-w-[630px] text-left">“The focus of this event is on the spray technology and the science driving its requirements, validation and possible uses,” Wanser wrote to the team.</div>
<div class="mx-auto w-full max-w-[630px] text-left">
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">The same month, the program detailed its progress toward the Alameda experiment in another donor report.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">“The science plan for the study has been shared with our colleagues at NOAA and DOE,” said a <a href="https://www.documentcloud.org/documents/25934071-20656718-20656718/#document/p7/a2664987">draft of the report</a>.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">A Department of Energy spokesperson acknowledged funding University of Washington “research on how ambient aerosols affect clouds,” but said the agency hadn’t supported “deliberate field deployment of aerosols into the environment.”</p>
<h2 class="mt-[1.25rem] md:mt-[1.875rem] text-3xl" data-v-b1186a93="">Mayor wondered ‘where it’s leading to’</h2>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">On April 1, 2024, the day before the Alameda experiment was launched, the program and its consultants appeared to be laying the groundwork for additional geoengineering tests, which an adviser said would likely <a href="https://www.documentcloud.org/documents/25933941-20651805-20651805/#document/p12/a2664924">need the support of federal officials</a>.</p>
</div>
</div>
<div class="max-w-[100%] p-0">
<div class="pt-[2.375rem] sm:pt-5 md:pt-[1.875rem]">
<div id="banner_btf_212-wrap" class="content-group ad relative before:inset-0 before:right-0 before:z-10 before:block before:w-full before:pb-2.5 before:text-center before:text-sm before:leading-[1.05rem] before:text-gray-vulcan-44 before:content-[attr(data-ad-label)]" data-ad-label="Advertisement" aria-label="Advertisement">
<div id="banner_btf_212_rlWr" aria-hidden="true" data-target="pos=212">
<div id="banner_btf_212" class="" aria-hidden="true" data-target="pos=212"></div>
<div id="banner_btf_212_rlSlot" class="rlSlot"></div>
<div id="banner_btf_212_slotSpacer" class="slotSpacer"></div>
</div>
</div>
</div>
</div>
<div class="mx-auto max-w-[1350px] gap-x-[30px] px-5 text-center sm:px-[30px] md:grid md:grid-cols-[1fr,300px] lg:grid-cols-[300px,1fr,300px]">
<div class="mx-auto w-full max-w-[630px] text-left"></div>
<div class="mx-auto w-full max-w-[630px] text-left">
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">Leaders from SilverLining, SRI and Accenture were invited to attend the discussion “to kick off the next phase of our work together” in the consulting firm’s 33rd floor offices in Salesforce Tower, the tallest building in San Francisco, a calendar invitation shows. Officials from the University of Washington and NOAA were also given the option to join. That evening, the calendar notifications show, everyone was invited to a happy hour and dinner.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">Accenture, SRI, the University of Washington and NOAA didn’t directly respond to questions about the events. Wanser of SilverLining said in an email that the San Francisco meeting “was completely separate” from the cloud brightening program, even though it included many of the same researchers.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">The following afternoon, team members and Accenture executives planned to give a sprayer demonstration to Pritzker, an heir to the Hyatt Hotels fortune and board chair of the think tanks Third Way and the Breakthrough Institute, and Michael Brune, a former executive director of the Sierra Club, according to another scheduling document.</p>
<aside class="order-2 mx-auto mt-[0.9375rem] block text-left md:mt-[1.875rem] container">
<figure class=""><picture><source srcset="https://www.politico.com/dims4/default/resize/280/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2F62%2F2c%2F46bdabf340a8862c18e54104dfaa%2Fcalifornia-storms-22773.jpg 280w, https://www.politico.com/dims4/default/resize/560/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2F62%2F2c%2F46bdabf340a8862c18e54104dfaa%2Fcalifornia-storms-22773.jpg 560w, https://www.politico.com/dims4/default/resize/630/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2F62%2F2c%2F46bdabf340a8862c18e54104dfaa%2Fcalifornia-storms-22773.jpg 630w, https://www.politico.com/dims4/default/resize/1260/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2F62%2F2c%2F46bdabf340a8862c18e54104dfaa%2Fcalifornia-storms-22773.jpg 1260w" type="image/webp" sizes="(max-width: 320px) 280px, (min-width: 321px) 630px" /><img decoding="async" class="aspect-image-3x2 w-full" src="https://www.politico.com/dims4/default/resize/630/quality/90/format/webp?url=https%3A%2F%2Fstatic.politico.com%2F62%2F2c%2F46bdabf340a8862c18e54104dfaa%2Fcalifornia-storms-22773.jpg" alt="Storm clouds drift over the USS Hornet and other ships in Alameda, California." /></picture><figcaption class="mt-2.5 text-sm leading-[1.3] text-gray-vulcan-44">Storm clouds drift over the USS Hornet and other ships in Alameda, California. Researchers briefly used the Hornet to test a cloud-making sprayer.  |  Ben Margot/AP</figcaption></figure>
</aside>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">It was an important moment for the team. The same technology that was being tested on the aircraft carrier’s deck would also be deployed in the much larger open-ocean experiment, the research plan shows.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">“I was impressed with the team that was putting it together,” Brune said in an interview. He attended the demo as an adviser to Larson, the crypto entrepreneur who has donated to SilverLining via the <a href="https://projects.propublica.org/nonprofits/organizations/205205488/202413129349304911/IRS990ScheduleI">Silicon Valley Community Foundation</a>.</p>
</div>
</div>
<div class="max-w-[100%] p-0">
<div class="pt-[2.375rem] sm:pt-5 md:pt-[1.875rem]">
<div id="banner_btf_213-wrap" class="content-group ad relative before:inset-0 before:right-0 before:z-10 before:block before:w-full before:pb-2.5 before:text-center before:text-sm before:leading-[1.05rem] before:text-gray-vulcan-44 before:content-[attr(data-ad-label)]" data-ad-label="Advertisement" aria-label="Advertisement">
<div id="banner_btf_213_rlWr" aria-hidden="true" data-target="pos=213">
<div id="banner_btf_213" class="" aria-hidden="true" data-target="pos=213"></div>
<div id="banner_btf_213_rlSlot" class="rlSlot"></div>
<div id="banner_btf_213_slotSpacer" class="slotSpacer"></div>
</div>
</div>
</div>
</div>
<div class="mx-auto max-w-[1350px] gap-x-[30px] px-5 text-center sm:px-[30px] md:grid md:grid-cols-[1fr,300px] lg:grid-cols-[300px,1fr,300px]">
<div class="mx-auto w-full max-w-[630px] text-left"></div>
<div class="mx-auto w-full max-w-[630px] text-left">
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">Brune, who lives in Alameda, said he wasn’t aware of the larger experiment until E&amp;E News contacted him. “The engagement with leaders here in Alameda was subpar, and the controversy was pretty predictable,” he added.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">In May 2024, city officials <a href="https://www.alamedaca.gov/Shortcut-Content/News-Media/City-responds-to-questions-about-a-University-of-Washington-cloud-brightening-experiment-on-the-U.S.S.-Hornet">halted the experiment</a> after complaining about the secrecy surrounding it. They also accused the organizers of violating the Hornet’s lease, which was only intended to allow museum-related activities. (The Hornet didn’t respond to a request for comment.)</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">At a City Council meeting the following month, Mayor Ashcraft said she wanted “a deeper understanding of the unintended consequences … not just of this small-scale experiment, but of the science, of this technology [and] where it’s leading to.” Then she and the other four council members voted unanimously to block the program from resuming its experiment.</p>
<h2 class="mt-[1.25rem] md:mt-[1.875rem] text-3xl" data-v-b1186a93="">Using federal aircraft ‘isn’t going to happen’</h2>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">Between April 2024 and the City Council’s vote that June, the research team scrambled to limit public backlash against the test. By then, the controversy had attracted national and local media attention.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">The information request from E&amp;E News sought roughly 14 months of text messages from or to Doherty and Robert Wood, another University of Washington researcher, that included or mentioned their collaborators at SilverLining or SRI. Some of the text messages that were shared by the university did not specify the sender, and Doherty and Wood did not respond to questions about them.</p>
</div>
</div>
<div class="max-w-[100%] p-0">
<div class="pt-[2.375rem] sm:pt-5 md:pt-[1.875rem]">
<div id="banner_btf_214-wrap" class="content-group ad relative before:inset-0 before:right-0 before:z-10 before:block before:w-full before:pb-2.5 before:text-center before:text-sm before:leading-[1.05rem] before:text-gray-vulcan-44 before:content-[attr(data-ad-label)]" data-ad-label="Advertisement" aria-label="Advertisement">
<div id="banner_btf_214_rlWr" aria-hidden="true" data-target="pos=214">
<div id="banner_btf_214_slotSpacer" class="slotSpacer">In one <a href="https://www.documentcloud.org/documents/25934016-20640948-20640948/">text message chain</a> on May 15, 2024, one person suggested SilverLining would pay to keep the Hornet museum closed when the tests were running “to give us some breathing space.”</div>
</div>
</div>
</div>
</div>
<div class="mx-auto max-w-[1350px] gap-x-[30px] px-5 text-center sm:px-[30px] md:grid md:grid-cols-[1fr,300px] lg:grid-cols-[300px,1fr,300px]">
<div class="mx-auto w-full max-w-[630px] text-left">
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">The sender added, “for risk management and the project [it’s] an easy call, and we can cover it.”</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">But an unidentified second person responded that “the community could actually find it additionally problematic that the project kept the Hornet shut down.”</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">The team members sent each other letters from people who supported the program, including one from science fiction writer Kim Stanley Robinson, whose 2020 novel “Ministry of the Future” featured a rogue nation that unilaterally implemented planetary-scale solar geoengineering.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">“The truth is that in the coming decades we are going to have to cope with climate change in many ways involving both technologies and social decisions,” he wrote to the City Council on May 29, 2024. The Alameda experiment “has the advantage of exploring a mitigation method that is potentially very significant, while also being localized, modular, and reversible. These are qualities that aren’t often attributed to geoengineering.”</p>
<aside class="order-2 mx-auto mt-[0.9375rem] block text-left md:mt-[1.875rem] container">
<figure class=""><img decoding="async" class="alignnone size-full wp-image-21436" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/webp.webp" alt="" width="618" height="300" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/webp.webp 618w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/webp-400x194.webp 400w" sizes="(max-width: 618px) 100vw, 618px" /><figcaption class="mt-2.5 text-sm leading-[1.3] text-gray-vulcan-44">Science fiction writer Kim Stanley Robinson’s letter of support for the Alameda experiment that was submitted to the city council.  |  University of Washington</figcaption></figure>
</aside>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">After the council vote, SilverLining hired a new public relations firm, Berlin Rosen, to handle the media attention. It also discussed organizing local events to recruit potential allies, emails show.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">Wanser, SilverLining’s executive director, wrote in a June 6, 2024, email to the research team that the program was considering “another run at a proposal to the city post-election, with, hopefully, a build up of local support and education in the interim.”</p>
</div>
</div>
<div class="max-w-[100%] p-0">
<div class="pt-[2.375rem] sm:pt-5 md:pt-[1.875rem]">
<div id="banner_btf_215-wrap" class="content-group ad relative before:inset-0 before:right-0 before:z-10 before:block before:w-full before:pb-2.5 before:text-center before:text-sm before:leading-[1.05rem] before:text-gray-vulcan-44 before:content-[attr(data-ad-label)]" data-ad-label="Advertisement" aria-label="Advertisement">
<div id="banner_btf_215_rlWr" aria-hidden="true" data-target="pos=215"></div>
</div>
</div>
</div>
<div class="mx-auto max-w-[1350px] gap-x-[30px] px-5 text-center sm:px-[30px] md:grid md:grid-cols-[1fr,300px] lg:grid-cols-[300px,1fr,300px]">
<div class="mx-auto w-full max-w-[630px] text-left">Ashcraft, the mayor, said in an email to E&amp;E News that she is “not aware of any additional outreach with the community” by the researchers, adding that they hadn’t engaged with her or city staff since the vote.</div>
<div class="mx-auto w-full max-w-[630px] text-left">
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">Meanwhile, even before Trump returned to office, the team had begun acknowledging that its mistakes in Alameda had decreased the likelihood of gaining government support for solar geoengineering research. Access to federal aircraft “isn’t going to happen any time soon,” Doherty, the program director, wrote to Wanser and other team members on June 14, 2024.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">The studies that the program is pursuing are scientifically sound and would be unlikely to alter weather patterns — even for the Puerto Rico-sized test, said Daniele Visioni, a professor of atmospheric sciences at Cornell University. Nearly 30 percent of the planet is already covered by clouds, he noted.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">That doesn’t mean the team was wise to closely guard its plans, said Visioni, who last year helped author ethical guidelines for solar geoengineering research.</p>
<p class="font-text text-lg leading-[1.6] mt-5 md:mt-[1.875rem]" data-v-b1186a93="">“There’s a difference between what they should have been required to do and what it would have been smart for them to do, from a transparent perspective, to gain the public’s trust,” he said. <a href="https://www.politico.com/news/2025/07/27/california-sunlight-dimming-experiment-collapse-00476983?_bhlid=6102bed32e4af5b54d6b56422fe6748ee2d2acd0&amp;utm_campaign=trump-health-whispers-explode-maga-is-anxious-after&amp;utm_medium=newsletter&amp;utm_source=americanalmanac.beehiiv.com" target="_blank" rel="noopener">source</a></p>
<hr />
<div class="k8dtcj0">
<div class="k8dtcj1"><span class="k8dtcj3 k8dtcj4"><a href="https://www.theverge.com/authors/elizabeth-lopatto">Elizabeth Lopatto</a> </span>A crypto tycoon and a VC funded an experiment to literally block sunlight in California.</div>
</div>
<div class="_1t4tcr90">
<div class="wn1wvof wn1wvo0">
<p class="duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1">A University of Washington experiment with “a machine to create clouds” was shut down by the city of Alameda — because the scientists didn’t bother to tell the locals what they were up to, <em>Politico</em> writes. They were 20 minutes into the test when <a href="https://www.politico.com/news/2024/06/05/california-geoengineering-blocked-00161733">city officials ended the experiment</a>.</p>
</div>
<div class="wn1wvof">
<p class="duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1">Donors to the Marine Cloud Brightening Program include “cryptocurrency billionaire Chris Larsen, the philanthropist Rachel Pritzker and Chris Sacca, a venture capitalist.” Can’t wait to find out what<a href="https://www.theverge.com/science/704711/cloud-seeding-flash-flood-conspiracy-theory"> new conspiracy theories</a> this spawns!</p>
<hr />
<h1 class="Title_CardDetail__Title__gl_p8">CA Test To Dim Sunlight Planned Quietly To Avoid Public Panic: Report</h1>
<h2 class="styles_CardDetail__Description__KnSxe">Researchers attempted to test a geoengineering technology that would&#8217;ve created clouds to block the sun&#8217;s rays.</h2>
<div class="styles_HTMLContent__LDG2k">
<p>Last year, a group of California researchers made headlines after they scrapped a secretive plan to test a cloud-making machine on a retired aircraft carrier on the San Francisco Bay. It was the nation’s first outdoor experiment to limit global warming by altering cloud behavior.</p>
</div>
<div class="styles_HTMLContent__LDG2k">
<p>However, they were actually plotting something much bigger — a multi-million-dollar effort to spray saltwater into the sky and cool the planet by creating clouds over an area larger than Puerto Rico, <a href="https://www.politico.com/news/2025/07/27/california-sunlight-dimming-experiment-collapse-00476983" target="_blank" rel="nofollow noopener">Politico</a> reported.</p>
<p>Politico uncovered details about the Marine Cloud Brightening Program in funding requests, emails, texts and other records. The details of the billionaire-backed solar geoengineering experiment were largely kept under wraps by researchers at the University of Washington.</p>
</div>
<div class="js-ad ContentBlocks_CardDetail__AdBlock__GpVT1 ContentBlocks_CardDetail__AdBlock--native__M_lBb ContentBlocks_CardDetail__AdBlock--desktop__70SV6">
<div id="artcl_1" class="ad ad--styled-margin" data-google-query-id="CPjSk8794o4DFSw_RAgdXVUvXA">
<div id="google_ads_iframe_/270360483/across-ca/politics_3__container__"><iframe id="google_ads_iframe_/270360483/across-ca/politics_3" tabindex="0" title="3rd party ad content" name="google_ads_iframe_/270360483/across-ca/politics_3" width="100%" height="0" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" sandbox="allow-forms allow-popups allow-popups-to-escape-sandbox allow-pointer-lock allow-same-origin allow-scripts allow-top-navigation-by-user-activation" aria-label="Advertisement" data-load-complete="true" data-google-container-id="3" data-mce-fragment="1"></iframe></div>
</div>
</div>
<div class="styles_HTMLContent__LDG2k">
<p>The experiment was intended to run for months aboard the decommissioned USS Hornet in the Alameda area before city officials effectively shut it down, arguing that no one had told them about it beforehand.</p>
<p>The goal of the test was to limit global warming by spraying salt into the air to brighten clouds so that they reflect the sun&#8217;s rays away from Earth as they enter the atmosphere.</p>
</div>
<div class="ContentBlocks_CardDetail__SubscribeBlock__4zBcQ ContentBlocks_CardDetail__SubscribeBlock--desktop__oN6vv">
<section class="styles_SubscribeForm__0dj5n">
<div class="styles_SubscribeForm__body__3Usxf">
<form class="styles_Card__Form__XLoCT">
<div class="styles_Card__FormInner__EMDdU">According to Politico, that scrapped test was just the beginning.</div>
</form>
</div>
</section>
</div>
<div class="styles_HTMLContent__LDG2k">
<p>Internal documents show the researchers were already in talks with donors and consultants about a much larger 3,900-square-mile cloud-making experiment off the coasts of North America, Chile or southern Africa — well before the initial trial even began. The details come from more than 400 internal records obtained by E&amp;E News through a public records request to the University of Washington.</p>
</div>
<div class="styles_HTMLContent__LDG2k">
<p>Many of these plans were drawn up quietly, Politico reported.</p>
<p>The team behind the program relied on museum staff at the USS Hornet to manage relations with Alameda leaders and carefully controlled the information it provided to the public, according to the documents obtained by Politico.</p>
</div>
<div class="styles_HTMLContent__LDG2k">
<p>“We think it’s safest to get air quality review help and are pursuing that in advance of engaging, but I’d avoid scaring them overly,” according to an <a href="https://www.documentcloud.org/documents/25933978-20640921-20640921/" target="_blank" rel="nofollow noopener">Aug. 23, 2023, text message</a> before a meeting with Hornet staff. “We want them to work largely on the assumption that things are a go.”</p>
<p>The strategy backfired.</p>
<p>When word got out about secretive experiment, locals were so rattled that the Alameda City Council voted to cancel it two months after it began.</p>
<p>Interest in this kind of climate intervention is growing — especially as efforts to cut fossil fuel emissions stall in the U.S. and Europe. But the idea of humans manipulating the weather has sparked political pushback and fueled conspiracy theories, making even small-scale experiments tough to pull off. <a href="https://patch.com/california/across-ca/ca-test-planned-dim-sunlight-was-done-quietly-avoid-public-panic-report" target="_blank" rel="noopener">source</a></p>
<hr />
<h1 class="mt-2 text-[1.625rem] font-bold leading-tight md:text-[2rem]">Scientists Secretly Working on Plan to Test Blocking Sun From Huge Area of Earth</h1>
<p class="mb-4 text-lg md:leading-8 break-words">Scientists are racing to find potential ways to slow down global warming, going far as to <a class="link yahoo-link" href="https://www.yahoo.com/news/scientists-preparing-experiments-dim-sun-180444151.html" data-ylk="slk:investigate ways to dim the Sun;elm:context_link;itc:0;sec:content-canvas;outcm:mb_qualified_link;_E:mb_qualified_link;ct:story;" data-rapid_p="32">investigate ways to dim the Sun</a>.</p>
<p class="mb-4 text-lg md:leading-8 break-words">The concept, known as solar geoengineering, has proven incredibly controversial in the past, with critics arguing that we simply don&#8217;t know enough about the risks, including the environmental and societal impacts of tinkering with the climate. Proponents don&#8217;t necessarily disagree, but they say the situation is already so bad that we need to consider drastic action, even if there is the potential for immense risk.</p>
<p class="mb-4 text-lg md:leading-8 break-words">In that charged environment, the sometimes secretive ways scientists have been going about early geoengineering experiments are leaving the door wide open for mounting backlash and even conspiracy theories.</p>
<p class="mb-4 text-lg md:leading-8 break-words">Last year, blindsided city officials in Alameda, California, ordered scientists from the University of Washington to <a class="link yahoo-link" href="https://www.yahoo.com/news/city-officials-halt-experiment-hack-203154735.html" data-ylk="slk:halt an unannounced experiment;elm:context_link;itc:0;sec:content-canvas;outcm:mb_qualified_link;_E:mb_qualified_link;ct:story;" data-rapid_p="33">halt an unannounced experiment</a> using a device that would inject cloud-brightening particles into the atmosphere, citing fears of unintended consequences.</p>
<p class="mb-4 text-lg md:leading-8 break-words">And now, according to <a class="link " href="https://www.politico.com/news/2025/07/27/california-sunlight-dimming-experiment-collapse-00476983" target="_blank" rel="nofollow noopener" data-ylk="slk:extensive records obtained by Politico;elm:context_link;itc:0;sec:content-canvas" data-rapid_p="34">extensive records obtained by <em>Politico</em></a>, it turns out the aborted experiment was meant to set the stage for a much larger-scale program that would have covered a 3,900-square-mile area — about the size of Puerto Rico — off the coast of North America, Chile, or south-central Africa.</p>
<p class="mb-4 text-lg md:leading-8 break-words">&#8220;At such scales, meaningful changes in clouds will be readily detectable from space,&#8221; one 2023 report obtained by the publication reads.</p>
<p class="mb-4 text-lg md:leading-8 break-words">But as experts told <em>Politico</em>, the University of Washington and its private partners, geoengineering firm SilverLining and nonprofit SRI International, didn&#8217;t exactly set themselves up for success.</p>
<p class="mb-4 text-lg md:leading-8 break-words">&#8220;Alameda was a stepping stone to something much larger, and there wasn’t any engagement with local communities,&#8221; University of California, Santa Cruz, environmental studies professor Sikina Jinnah told the outlet. &#8220;That’s a serious misstep.&#8221;</p>
<p class="mb-4 text-lg md:leading-8 break-words">However, university officials maintained that the program never aimed to &#8220;alter weather or climate,&#8221; and that there weren&#8217;t any &#8220;plans for conducting large-scale studies,&#8221; either.</p>
<p class="mb-4 text-lg md:leading-8 break-words">Geoengineering has proven incredibly divisive, quickly turning into a hot-button political subject. Representative Marjorie Taylor Greene (R-GA), who has a long track record of furthering unsubstantiated conspiracy theories, mistakenly blamed the deadly flood in Texas in early July on geoengineering, without providing any evidence. Later this month, she <a class="link " href="https://www.washingtonpost.com/climate-environment/2025/07/16/weather-modification-geoengineering-cloud-seeding-right/" target="_blank" rel="nofollow noopener" data-ylk="slk:introduced;elm:context_link;itc:0;sec:content-canvas" data-rapid_p="35">introduced</a> &#8220;weather modification&#8221; legislation based on the conspiracy theory.</p>
<p class="mb-4 text-lg md:leading-8 break-words">Discussions have even filtered to the top, with EPA administrator Lee Zeldin entertaining legislation motivated by long-debunked <a class="link " href="https://www.nytimes.com/2025/07/10/climate/epa-debunks-chemtrails-conspiracy-theory.html" target="_blank" rel="nofollow noopener" data-ylk="slk:conspiracy theories;elm:context_link;itc:0;sec:content-canvas" data-rapid_p="36">conspiracy theories</a> surrounding &#8220;chemtrails.&#8221;</p>
<p class="mb-4 text-lg md:leading-8 break-words">Even huge swathes of the scientific community aren&#8217;t convinced that dimming the Sun is the answer, citing unknown knock-on risks that could make the cure worse than the disease.</p>
<p class="mb-4 text-lg md:leading-8 break-words">They also often argue that geoengineering could serve as a band-aid fix, allowing world leaders to ignore the immediate causes of climate change, including the burning of fossil fuels and other sources of greenhouse gas emissions.</p>
<p class="mb-4 text-lg md:leading-8 break-words">Those in support of efforts to dim the Sun argue we need to leave no stone unturned in our efforts to battle a growing climate crisis.</p>
<p class="mb-4 text-lg md:leading-8 break-words">&#8220;At a time when scientists are facing political attacks and drastic funding cuts, we need to complement a rapid energy transition with more research into a broad range of potential climate solutions,&#8221; cryptocurrency billionaire Chris Larsen, who donated to the University of Washington&#8217;s program, told <em>Politico</em>.</p>
<p class="mb-4 text-lg md:leading-8 break-words">Where all of this leaves the university and its private partner&#8217;s early experiments to seed clouds remains to be seen. Despite billions in funding from some notable donors, including the cofounder of Intel, the political opposition and public backlash could make it difficult for the project to get off the ground.</p>
<p class="mb-4 text-lg md:leading-8 break-words">However, similar geoengineering projects outside of the United States could continue where the program left off. Earlier this year, the UK’s Advanced Research and Invention Agency <a class="link yahoo-link" href="https://www.yahoo.com/news/scientists-preparing-experiments-dim-sun-180444151.html" data-ylk="slk:announced it would invest $60 million;elm:context_link;itc:0;sec:content-canvas;outcm:mb_qualified_link;_E:mb_qualified_link;ct:story;" data-rapid_p="37" data-v9y="1">announced it would invest $60 million</a> in <a class="link " href="https://theconversation.com/five-geoengineering-trials-the-uk-is-funding-to-combat-global-warming-256515" target="_blank" rel="nofollow noopener" data-ylk="slk:five small climate-cooling research projects;elm:context_link;itc:0;sec:content-canvas" data-rapid_p="38" data-v9y="1">five small climate-cooling research projects</a>, including &#8220;marine cloud brightening&#8221; to make them reflect more sunlight, refreezing the Arctic by pumping seawater from below the ice to the surface, and investigating the idea of injecting natural mineral dust into the stratosphere.</p>
<p class="mb-4 text-lg md:leading-8 break-words">But getting the public on their side, particularly given how little even experts understand about the potential environmental impacts, <a class="link " href="https://www.science.org/content/article/geoengineering-fight-climate-change-if-public-can-convinced" target="_blank" rel="nofollow noopener" data-ylk="slk:could end up being a steep hill to climb;elm:context_link;itc:0;sec:content-canvas" data-rapid_p="39" data-v9y="1">could end up being a steep hill to climb</a>. <a href="https://www.yahoo.com/news/articles/scientists-secretly-working-plan-test-185816508.html" target="_blank" rel="noopener">source</a></p>
</div>
</div>
</div>
</div>
</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Detecting IMSI Catchers: Tools, Apps and Methods You Should Know</title>
		<link>https://goodshepherdmedia.net/detecting-imsi-catchers-tools-apps-and-methods-you-should-know/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 25 Aug 2025 21:49:26 +0000</pubDate>
				<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[Home Defense / Safety]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Phone Hacks]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[Apps and Methods You Should Know]]></category>
		<category><![CDATA[Cell-site simulators]]></category>
		<category><![CDATA[Detecting IMSI Catchers: Tools]]></category>
		<category><![CDATA[IMSI Catcher]]></category>
		<category><![CDATA[imsi catchers]]></category>
		<category><![CDATA[IMSI catchers: a security threat]]></category>
		<category><![CDATA[Stingray phone tracker]]></category>
		<category><![CDATA[Understanding How IMSI-Catchers Exploit Cell Networks]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21336</guid>

					<description><![CDATA[Detecting IMSI Catchers: Tools, Apps and Methods You Should Know An IMSI-catcher is a device that intercepts mobile phone communications, acting as a fake cell tower to eavesdrop on calls and track location data. It&#8217;s essentially a &#8220;man-in-the-middle&#8221; attack, placing the device between the target phone and the real cell network. While some security measures exist in [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="entry-title">Detecting IMSI Catchers: Tools, Apps and Methods You Should Know</h1>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21340" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Detecting-IMSI-Catchers-Tools-Apps-and-Methods-You-Should-Know.jpg" alt="" width="800" height="800" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Detecting-IMSI-Catchers-Tools-Apps-and-Methods-You-Should-Know.jpg 800w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/Detecting-IMSI-Catchers-Tools-Apps-and-Methods-You-Should-Know-400x400.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/Detecting-IMSI-Catchers-Tools-Apps-and-Methods-You-Should-Know-150x150.jpg 150w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/Detecting-IMSI-Catchers-Tools-Apps-and-Methods-You-Should-Know-768x768.jpg 768w" sizes="(max-width: 800px) 100vw, 800px" /></p>
<p><span data-huuid="12916251619821288363">An IMSI-catcher is a device that intercepts mobile phone communications, acting as a fake cell tower to eavesdrop on calls and track location data. </span><span data-huuid="12916251619821288608">It&#8217;s essentially a &#8220;man-in-the-middle&#8221; attack, placing the device between the target phone and the real cell network. </span><span data-huuid="12916251619821288853">While some security measures exist in newer standards (like 3G), sophisticated attacks can bypass these, especially on older networks. </span><span data-huuid="12916251619821289098">These devices, like the <span class="M5tQyf"><strong>StingRay</strong>,</span> are used by law enforcement and intelligence agencies, but their use raises privacy and civil liberty concerns.<span class="pjBG2e" data-cid="0254da5d-6a60-4252-9748-b8be8c5ec492"><span class="UV3uM"> </span></span></span></p>
<h2>IMSI catchers: a security threat</h2>
<div id="aim-chrome-initial-inline-async-container" data-ved="2ahUKEwj5tOPnsMyOAxXsJEQIHf4cG7QQ_ZkOegYIAQgAEBQ" data-hveid="CAEIABAU">
<div data-processed="true">
<div class="CKgc1d" data-scope-id="turn" data-processed="true" data-complete="true">
<div class="Zkbeff" data-subtree="aimc" data-aimmrs="true" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQ2O0OegQIABAA" data-hveid="CAAQAA" data-processed="true" data-complete="true">
<div class="pWvJNd" data-processed="true" data-complete="true">
<div class="mZJni" data-container-id="main-col" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQ3KYQegQIABAD" data-processed="true" data-complete="true">
<div class="Y3BBE" data-hveid="CAAQEg" data-complete="true" data-processed="true">An IMSI catcher, sometimes called a Stingray, is a device that impersonates a legitimate cell tower. It works by mimicking cell tower signals and attracting nearby mobile devices, tricking them into connecting to the device instead of a genuine cell tower. Once a device connects, the IMSI catcher can capture the device&#8217;s unique identifier, the International Mobile Subscriber Identity (IMSI).<span class="" data-wiz-rootname="ohfaMd" data-complete="true" data-processed="true"><span class="vKEkVd" data-animation-atomic="" data-sae=""> <button class="rBl3me" tabindex="0" data-amic="true" data-icl-uuid="daf9ecda-6d56-4163-b71b-24f3c7686c4a" aria-label="View related links" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQye0OegQIABAT"></button></span></span></div>
<div class="Y3BBE" data-hveid="CAAQFA" data-processed="true" data-complete="true">This allows the IMSI catcher to:</div>
<ul class="U6u95" data-complete="true" data-processed="true">
<li data-hveid="CAAQFg" data-complete="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Track the device&#8217;s location</b> by analyzing the signal strength of the phone.</span></li>
<li data-hveid="CAAQFw" data-complete="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Identify and monitor activity</b>, and potentially even intercept communications, including SMS and calls, depending on the network protocol.</span><span class="" data-wiz-rootname="ohfaMd" data-complete="true"><span class="vKEkVd" data-animation-atomic="" data-sae=""> <button class="rBl3me" tabindex="0" data-amic="true" data-icl-uuid="670887ed-08de-4a8c-9ff5-7bf40ef17ffd" aria-label="View related links" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQye0OegQIABAY"></button></span></span></li>
</ul>
<div class="Y3BBE" data-hveid="CAAQGg" data-processed="true" data-complete="true">IMSI catchers can be used by law enforcement, and potentially by unauthorized actors including criminals or foreign intelligence services. The use of these devices raises significant privacy concerns due to the indiscriminate collection of data, which may include bystanders as well as targeted individuals.<span class="" data-wiz-rootname="ohfaMd" data-complete="true" data-processed="true"><span class="vKEkVd" data-animation-atomic="" data-sae=""> <button class="rBl3me" tabindex="0" data-amic="true" data-icl-uuid="54c6456f-6f79-45d6-8c0f-760c83c9443a" aria-label="View related links" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQye0OegQIABAb"></button></span></span></div>
<div class="Fsg96" data-processed="true" data-complete="true"></div>
<div class="otQkpb" role="heading" aria-level="3" data-processed="true" data-complete="true">Potential threats</div>
<ul class="U6u95" data-complete="true" data-processed="true">
<li data-hveid="CAAQHQ" data-complete="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Location Tracking:</b> IMSI catchers can track a phone&#8217;s location and movements.</span></li>
<li data-hveid="CAAQHg" data-complete="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Communication Interception:</b> Older generation networks (like 2G) are more vulnerable, allowing interception of calls and texts. While 3G, 4G, and 5G networks are more secure, some IMSI catchers can potentially force a device to downgrade to an older, less secure network.</span></li>
<li data-hveid="CAAQHw" data-complete="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Denial of Service:</b> IMSI catchers can also disrupt mobile network connectivity.</span><span class="" data-wiz-rootname="ohfaMd" data-complete="true"><span class="vKEkVd" data-animation-atomic="" data-sae=""> <button class="rBl3me" tabindex="0" data-amic="true" data-icl-uuid="b15d0dc0-c4f4-4750-be02-e68a02eaf8c9" aria-label="View related links" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQye0OegQIABAg"></button></span></span></li>
</ul>
<div class="Fsg96" data-complete="true" data-processed="true"></div>
<div class="otQkpb" role="heading" aria-level="3" data-processed="true" data-complete="true">Detection</div>
<div class="Y3BBE" data-hveid="CAAQIg" data-complete="true" data-processed="true">Detecting IMSI catchers with a smartphone alone can be difficult. Hardware-based detection systems provide a more reliable means of identification.<span class="" data-wiz-rootname="ohfaMd" data-complete="true" data-processed="true"><span class="vKEkVd" data-animation-atomic="" data-sae=""> <button class="rBl3me" tabindex="0" data-amic="true" data-icl-uuid="7d40a971-c6b4-42c0-8686-6b9a9a15c3a0" aria-label="View related links" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQye0OegQIABAj"></button></span></span></div>
<div class="Fsg96" data-processed="true" data-complete="true"></div>
<div class="otQkpb" role="heading" aria-level="3" data-processed="true" data-complete="true">Protecting yourself</div>
<ul class="U6u95" data-processed="true" data-complete="true">
<li data-hveid="CAAQJQ" data-complete="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Keep software updated:</b> Ensure your phone&#8217;s operating system and applications are up to date.</span></li>
<li data-hveid="CAAQJg" data-sae="" data-complete="true"><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Use encrypted communication tools:</b> Utilize apps like Signal or WhatsApp that offer end-to-end encryption.</span></li>
<li data-hveid="CAAQJw" data-complete="true" data-processed="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Consider using a VPN:</b> A VPN can encrypt your internet traffic.</span></li>
<li data-hveid="CAAQKA" data-complete="true" data-processed="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Enable Airplane mode:</b> When not actively using your phone, switching to airplane mode can help prevent connections to cell towers, including IMSI catchers.</span></li>
<li data-hveid="CAAQKQ" data-complete="true" data-processed="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Be aware of your surroundings:</b> Pay attention to suspicious devices resembling cell towers, especially in sensitive areas or during events like protests or rallies.</span></li>
<li data-hveid="CAAQKg" data-complete="true" data-processed="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Consider a Faraday cage:</b> A Faraday cage can block radio waves and protect your phone from interception.</span><span class="" data-wiz-rootname="ohfaMd" data-complete="true"><span class="vKEkVd" data-animation-atomic="" data-sae=""> </span></span></li>
</ul>
</div>
</div>
</div>
</div>
</div>
</div>
<p><iframe title="What is an IMSI Catcher?" width="640" height="360" src="https://www.youtube.com/embed/wqhtMiKaLk0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>IMSI catchers, sometimes referred to as cell-site simulators or fake cell towers, can be difficult to detect since they imitate real cell towers to capture mobile phone data. With proper cybersecurity testing measures, you can effectively be alert to these unwanted interceptions. Take a look at these common tools and methods that can efficiently assist in identifying IMSI catchers:</p>
<h2><strong>Top Techniques and Resources to Detect IMSI Catchers</strong></h2>
<h3><strong>1. Use Mobile Apps and Tools</strong></h3>
<p>Some apps and technologies are designed to monitor and detect irregularities in cell networks.</p>
<p><strong>SnoopSnitch (Android):</strong> This app analyses your phone’s network traffic and alerts you of strange cell tower behaviour. It requires access to low-level network data, which is mostly limited to particular Android phones equipped with Qualcomm chipsets.</p>
<p><strong>Cell Spy Catcher (Android):</strong> After starting the learning process of this app, it collects data on local networks to identify which one among them is a trap. Then it alerts you with a red interface screen.<br />
<strong>AIMSICD (Android):</strong> Detects IMSI catchers and reports on odd network activity, such as quick cell tower changes or downgrades to earlier network technologies (such as 2G). Phones switching to older network technologies usually happen due to IMSI catchers.</p>
<p><strong>Croatian Telecom’s AntiSpy (Android/iOS):</strong> An app that uses radio signal analysis to determine when your phone connects to a rogue cell tower.</p>
<p>Apple’s limitations on low-level network data access have led to a decrease in the number of apps accessible for iOS; however, network abnormalities can occasionally be found by keeping an eye on variations in signals.</p>
<h3><strong>2. Look for Unusual Network Activity</strong></h3>
<p>IMSI catchers can force phones to connect to low-security older networks (2G or 3G) to facilitate communication interceptions. Look out for:</p>
<p><strong>Downgraded connection:</strong> Your phone may unexpectedly switch from 4G/5G to 2G/3G or lose high-speed internet connection. Specifically, if it happens in an area that has outstanding coverage, it could be due to an IMSI catcher.</p>
<p><strong>Frequent disconnections:</strong> When an IMSI catcher is nearby, your phone might keep on disconnecting and reconnecting with the network.</p>
<p><strong>Suspicious network names:</strong> IMSI catchers can also broadcast non-standard or dubious network IDs. For example, a tower with an unusual name or ID might be a fake one.</p>
<h3><strong>3. Observe Battery and Signal Behaviour</strong></h3>
<p>IMSI catchers compel gadgets to transmit at faster speeds and consume more power.</p>
<p><strong>Rapid battery drain:</strong> If the battery on your phone runs out more quickly than usual, it can be because it’s transferring an unusual amount of data to a fake tower.</p>
<p><strong>Unusual signal intensity:</strong> An IMSI catcher may be indicated by abrupt, inexplicable changes in signal strength or highly fluctuating signal bars. Strong signals can be sent by these devices to overpower authorised cell towers.</p>
<h3><strong>4. Monitoring Tools for Experts</strong></h3>
<p>Advanced phone users with proper cybersecurity knowledge can utilise monitoring software or equipment to analyse cellular networks themselves.</p>
<p><strong>Software-defined radios (SDRs):</strong> SDR devices enable users to identify and analyse mobile phone signals. By identifying aberrant radio frequencies and patterns, an SDR can aid in the detection of IMSI catchers if used with the appropriate software.</p>
<p><strong>Cellular anomaly detectors:</strong> These are sophisticated technologies used by security experts and researchers that monitor local signals. These help detect abnormal cell tower behaviour that is essential in the <strong>current rise of data breaches</strong>, unexpected cyber attacks, or traffic demand in Australia.</p>
<h3><strong>5. Network Data Monitoring</strong></h3>
<p>Certified cyber security consultants in Australia suggest users to monitor network data. This includes the phone’s network logs like signal strength, base station ID, and encryption status that certain apps or customised firmware can access. Keeping an eye on this data can help determine when the phone connects to a dubious tower that may have less secure encryption or an unidentified ID.</p>
<h3><strong>6. Physical Indicators</strong></h3>
<p>IMSI catchers are usually non-stationary and can be implanted on vehicles or drones. So if you observe any strange and unknown vehicles or equipment within your local area and your phone network falters near it, it could be a clue.</p>
<h3><strong>7. Use Encrypted Communication</strong></h3>
<p>If you are wary of an IMSI catcher but are tech savvy or cannot locate it, resolve to the simple methods of using end-to-end encrypted apps. Switch to apps like WhatsApp, Signal, or Telegram for calls and texts for that while. These platforms prevent intercepted communications from being decoded, even if you do not know how to use tools for detecting IMSI catcher.</p>
<p><strong>Limitations</strong></p>
<p><strong>False positives:</strong> Certain apps, software, or devices may identify normal network issues as suspicious.</p>
<p><strong>Limited detection on iPhones:</strong> iOS restricts access to low-level radio data, making it more difficult to operate apps that monitor cellular networks. <a href="https://www.cyberneticgi.com/2024/10/15/detecting-imsi-catchers-tools-apps-and-methods/" target="_blank" rel="noopener">source</a></p>
<hr />
<h1 class="entry-title wp-block-post-title">With $20 of Gear from Amazon, Nearly Anyone Can Make This IMSI-Catcher in 30 Minutes</h1>
<p>With some dirt cheap tech I bought from Amazon and 30-minutes of set-up time, I was streaming sensitive information from phones all around me. IMSIs, the unique identifier given to each SIM card, can be used to <a href="https://motherboard.vice.com/en_us/article/zmkj38/emf-camp-imsi-catcher-" target="_blank" rel="noopener">confirm whether someone is in a particular area</a>. They can also be used as part of another attack to take over a person’s phone number and redirect their text messages. Obtaining this information was incredibly easy, even for a non-expert.</p>
<div class="wp-block-savage-platform-primis-video">
<div class="wp-block-savage-platform-primis-video__wrapper">
<div>
<div class="primisslate">
<div id="primis_container_div_687d600c04235">
<div id="primis_playerSekindoSPlayer687d600c04232">
<div id="Player-Div-SekindoSPlayer687d600c04232">
<div id="Video-Div-SekindoSPlayer687d600c04232">
<div id="pixelsDiv"></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p>This attack isn’t revolutionary in any way—IMSI-catchers <a href="https://motherboard.vice.com/en_us/article/nz798m/harris-imsi-catcher-picture-phone-tracking-device-in-the-wild" target="_blank" rel="noopener">are certainly not new</a>, and have become famous because they are commonly (and controversially) used by law enforcement to track suspected criminals. A commercial version made by Harris is called a “Stingray,” and they are sometimes called “cell-site simulators” or “fake cell towers.” This is because they spoof a cell phone tower’s connection, meaning that cell phones in the area will try to connect to it; in doing so, the IMSI-catcher is able to passively collect information about phones in the area.</p>
<div class="code-block code-block-1">
<div id="htlad-post-article-2" class="lngtd-dynamic-inarticle lngtd-dyn-ph">
<div id="vice_D_inarticle_2-1" class="lngtd-dynamic-ad-container" data-label="Advertisement" data-state="loaded"></div>
</div>
</div>
<p>Harris’s Stingray was so secretive that, for years, the <a href="https://arstechnica.com/tech-policy/2015/04/fbi-would-rather-prosecutors-drop-cases-than-disclose-stingray-details/" target="_blank" rel="noopener">FBI dropped criminal court cases</a> that used Stingrays rather than reveal the details of how the evidence was gathered.</p>
<p>But a DIY IMSI catcher is relatively trivial to setup, and the technology is accessible to anyone with a cheap laptop, $20 of gear, and, the ability to essentially copy and paste some commands into a computer terminal. This is about ease of access; a lower barrier of technical entry. In a similar way to so-called spouseware—<a href="https://motherboard.vice.com/en_us/article/53vm7n/inside-stalkerware-surveillance-market-flexispy-retina-x" target="_blank" rel="noopener">malware used by abusive partners</a>—surveillance takes on different character when it trickles down to more ordinary, everyday users. The significance and threat from IMSI-catchers is multiplied when a lot more people can deploy one.</p>
<p class="article__blockquote"><i><b>Got a tip? You can contact Joseph Cox securely on Signal on +44 20 8133 5190, OTR chat on jfcox@<span class="skimlinks-unlinked">jabber.ccc.de</span>, or email <span class="skimlinks-unlinked">joseph.cox@vice.com</span>.</b></i></p>
<p>For legal and technical reasons, our IMSI-catcher did not intercept text messages or phone calls, like more powerful versions can. It only captured IMSIs from devices, as well as provides some additional information such as the country and telecom operator of the phone. Motherboard did not store any of the collected data. You should be aware of the laws in your local region before attempting to do this; Motherboard does not condone or suggest you do anything illegal (and, even if legal, you shouldn’t use an IMSI catcher to do anything creepy.)</p>
<p>We’ll explain what each of these are, but in short, the process was:</p>
<ul class="wp-block-list">
<li>Buy a cheap, software defined radio</li>
<li>Install Ubuntu</li>
<li>Download IMSI-catcher script with its dependencies</li>
<li>Find the right frequency to scan for</li>
<li>Start scanning on that frequency and picking up IMSIs</li>
</ul>
<div class="code-block code-block-1"></div>
<div class="article__media--image"></div>
<p>As the name implies, a software defined radio, or SDR, is simply a radio that instead of having its feature baked in at a hardware level, can be controlled by a computer program. We bought <a href="https://www.amazon.co.uk/NooElec-NESDR-Mini-Previously-Compatible/dp/B009U7WZCA" target="_blank" rel="noopener" data-ml-dynamic="true" data-ml-dynamic-type="sl" data-orig-url="https://www.amazon.co.uk/NooElec-NESDR-Mini-Previously-Compatible/dp/B009U7WZCA" data-ml-id="0" data-ml="true" data-xid="fr1753047054953cei" data-skimlinks-tracking="xid:fr1753047054953cei">the ‘NooElec NESDR Mini’ from Amazon for around $20</a> and received it a few days later.</p>
<p>To get the SDR to talk to phones, I needed to give it some instructions. Fortunately, I didn’t need to write my own, but just take some code from GitHub. I used a Python tool <a href="https://github.com/Oros42/IMSI-catcher" target="_blank" rel="noopener">simply called ‘IMSI-catcher’</a>, written by the hacker known as Oros42. The program requires an up-to-date version of Ubuntu, a particular Linux distribution, that can be downloaded for free and written either to a USB stick or installed inside a virtual machine.</p>
<p>To install the IMSI-catcher software, I just followed the instructions on <a href="https://github.com/Oros42/IMSI-catcher" target="_blank" rel="noopener">the project’s GitHub</a>.</p>
<p>Once installed, I booted up grgsm_livemon, one of the programs included with the project. which presented a slider and a graph, to find a frequency to scan. This required a bit of trial and error—moving the frequency slider until finding a sweet spot where the graph represented a bell curve. The curve meant that the SDR had found what frequency nearby phones were broadcasting on. Depending on where you are, that frequency is going to be different.</p>
<div class="code-block code-block-1">
<div id="htlad-post-article-7" class="lngtd-dynamic-inarticle lngtd-dyn-ph">
<div id="vice_D_inarticle_1-4" class="lngtd-dynamic-ad-container" data-label="Advertisement"></div>
</div>
</div>
<p>Once I found the sweet spot, after a few seconds IMSIs started appearing on my screen.</p>
<figure class="wp-block-image"><img loading="lazy" decoding="async" class="attachment-full size-full" src="https://www.vice.com/wp-content/uploads/sites/2/2018/11/1542319074607-IMG_4742.png" alt="imsi-catcher" width="1107" height="584" /><figcaption class="wp-element-caption">Caption: A redacted photo of IMSIs captured by the SDR and related script. Image: Motherboard</figcaption></figure>
<div class="code-block code-block-1">
<div id="htlad-post-article-8" class="lngtd-dynamic-inarticle lngtd-dyn-ph">
<div id="vice_D_inarticle_2-4" class="lngtd-dynamic-ad-container" data-label="Advertisement" data-state="loaded" data-google-query-id="CIOr6aC0zI4DFUjcuAgdCJ0Z_g">
<div id="google_ads_iframe_/16916245/vice/vice_D_inarticle_2_3__container__"></div>
</div>
</div>
</div>
<p>If I wanted to make the IMSI-catcher a bit more portable, I could theoretically run it on a Raspberry-Pi, a miniature computer you can buy for as little as $30 or cheaper, depending on what model you need. Note that the IMSI-catcher would still need to have Ubuntu on the Pi, which it is not traditionally designed for, <a href="https://linuxconfig.org/install-ubuntu-16-04-mate-or-ubuntu-18-04-on-raspberry-pi" target="_blank" rel="noopener">but it is likely possible</a>. I would also need to make sure the SDR is receiving enough power from the USB port.</p>
<p>In all, the process of making an IMSI-catcher didn’t take much time at all, as I thankfully didn’t hit any roadblocks. I just made sure I had the latest version of Ubuntu, followed the instructions carefully, and ended up with an IMSI-catcher on my laptop. <a href="https://www.vice.com/en/article/how-i-made-imsi-catcher-cheap-amazon-github/" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
<p><iframe title="This $50 Device lets anyone spy and track your phone!" width="640" height="360" src="https://www.youtube.com/embed/PpkLts5fdII?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<blockquote>
<h3><span style="color: #008080;"><a class="url fn" href="https://github.com/Oros42" rel="author" data-hovercard-type="user" data-hovercard-url="/users/Oros42/hovercard" data-octo-click="hovercard-link-click" data-octo-dimensions="link_type:self" aria-keyshortcuts="Alt+ArrowUp">Oros42</a></span><span class="mx-1 flex-self-stretch color-fg-muted">/</span><strong class="mr-2 flex-self-stretch"><a href="https://github.com/Oros42/IMSI-catcher" data-pjax="#repo-content-pjax-container" data-turbo-frame="repo-content-turbo-frame">IMSI-catcher DOWNLOAD HERE</a> i</strong>MSI CATHER SOFTWARE AND BUILD YOUR OWN!<span style="color: #ff0000;"> TO OF COURSE SOLVE SECURITY FLAWS IN YOUR OWN SYSTEM ONLY </span></h3>
<h3><span class="author flex-self-stretch"><a class="url fn" href="https://github.com/CellularPrivacy" rel="author" data-hovercard-type="organization" data-hovercard-url="/orgs/CellularPrivacy/hovercard" data-octo-click="hovercard-link-click" data-octo-dimensions="link_type:self" aria-keyshortcuts="Alt+ArrowUp">CellularPrivacy</a></span><span class="mx-1 flex-self-stretch color-fg-muted">/</span><strong class="mr-2 flex-self-stretch"><a href="https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector" data-pjax="#repo-content-pjax-container" data-turbo-frame="repo-content-turbo-frame">Android-IMSI-Catcher-Detector DOWNLOAD HERE </a></strong><span style="color: #008080;">IMSI CATHER SOFTWARE AND BUILD YOUR OWN!</span><span style="color: #ff0000;"> TO OF COURSE SOLVE SECURITY FLAWS IN YOUR OWN SYSTEM ONLY </span></h3>
</blockquote>
<p>&nbsp;</p>
<hr />
<h1>Gotta Catch &#8216;Em All: Understanding How IMSI-Catchers Exploit Cell Networks</h1>
<div class="panel-pane pane-node-content">
<article class="node node--whitepaper node--full node--whitepaper--full" role="article">
<div class="node__content">
<div class="field field--name-body field--type-text-with-summary field--label-hidden">
<div class="field__items">
<div class="field__item even">
<h2>Section 1: Introduction</h2>
<p>You’ve probably heard of Stingrays or IMSI-catchers, which belong to the broader category of “Cell Site Simulators” (CSSs). These devices let their operators “snoop” on the phone usage of people nearby. There’s a lot of confusion about what CSSs are actually capable of, and different groups—from activists to policy makers to technologists—understand them differently.</p>
<p>In the research community, there has been a tendency to dismiss the prevalence of CSS and the threat they pose to the public. Congress <a href="https://fcw.com/articles/2019/02/21/cell-site-simulators-congress.aspx">recently asked</a> the Department of Homeland Security for more information about their use by federal law enforcement, as well as state and local partners. It&#8217;s unclear how much oversight the Department has been exercising, and when it comes to state and local law enforcement, only a few cities have any protections at all. Many activists aren’t aware that CSSs could be in use around them without their knowledge, particularly during protests. The truth is that CSSs are significantly more widespread than most policy makers, researchers, and activists are aware, and their danger to privacy is more significant than most realize. Of course, it’s hard to acknowledge the prevalence of CSSs when law enforcement goes to great lengths to keep information about them from the public.</p>
<p>There is a plethora of low-level academic research in the area of cell network security, and many high-level posts that don’t really explain in any meaningful detail what’s going on with “IMSI-catcher” type cell network attacks. Our goal is to bridge that gap, and with this post we hope <strong>to make accessible the technical inner workings of CSSs, or rather, the details of the kind of attacks they might rely on</strong>. For example, what are the different kinds of location tracking attacks and how do they actually work? Another example: it’s also widely believed that CSSs are capable of communication interception, but what are the known limits around cell network communication interception and how does that actually work?</p>
<p>We won’t be updating this post with new kinds of attacks as they come out, and we can’t cover every potentially relevant detail of every attack we explain, but this post should form a basis for non-experts to better understand new attacks.</p>
<h2><a id="BackgroundInfo"></a>Section 2: Necessary background info</h2>
<p>There’s a lot of confusion about what CSSs actually do and how they do it. This confusion comes from the fact that the term “cell site simulator” actually encapsulates quite a variety of different cell network attacks that have evolved significantly over the last 25 years or so. Adding to the confusion is the fact that the term “IMSI-catcher” is both used interchangeably with “cell site simulator” and also refers to specific capabilities that some CSSs have.</p>
<p>A very important distinction when talking about CSSs is which cell network generations they use when operating. The term “cell network generation” refers to the complete set of operating protocols covering everything from how cell towers are laid out geographically to how a mobile phone establishes a connection with a cell tower.</p>
<p>Here’s a high-level overview of the most relevant cell network generations:</p>
<ul>
<li>2G (e.g. GSM): the oldest type of cell network still in use and still very widely used. 2G only supports calling/texting, but in 2.5G the capability to support data transmission (e.g. email and Internet access) was introduced.</li>
<li>3G (e.g. UMTS or CDMA2000): improved upon 2G by having much faster data rates (which could support video calls, for example) and adding better security (more on this later).</li>
<li>4G (e.g. LTE or WiMax): significantly faster speeds and better security.</li>
</ul>
<p>The specifications for these networks are developed by working groups organized by the 3GPP,<sup id="fnref1"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn1" rel="footnote">1</a></sup> an international organization that any group can apply to join (though it has a high membership fee). Members typically include mobile carriers, university research labs, and wireless gear manufacturers (including surveillance tech manufacturers).</p>
<p>It’s important to note that in practice there’s often a lot of variance between what the specifications say and what actually ends up being implemented. This is usually due to (1) implementers needing to differ from the specifications for practical reasons (many parts of the specifications get marked as optional), and (2) mistakes.</p>
<p>There’s a bit more vocabulary and background that needs to be introduced:</p>
<ul>
<li>IMSI (International Mobile Subscriber Identity): the unique identifier linked to your SIM card that is one of the pieces of data used to authenticate you to the mobile network. It’s meant to be kept private (because, as we’ll see later, it can be linked to your physical location and your phone calls/messages/data).</li>
<li>TMSI: upon first connecting to a network, the network will ask for your IMSI to identify you, and then will assign you a TMSI (Temporary Mobile Subscriber Identifier) to use while on their network. The purpose of the pseudonymous TMSI is to try and make it difficult for anyone eavesdropping on the network to associate data sent over the network with your phone.</li>
<li>IMEI (International Mobile Equipment Identity): the unique identifier linked to your physical mobile device.</li>
<li>Ki: a secret cryptographic key also stored on the SIM card used to authenticate your phone to the network (and prove you are who you say you are).</li>
<li>MCC (Mobile Country Code): your mobile country code, but not to be confused with a country’s <a href="https://en.wikipedia.org/wiki/List_of_mobile_telephone_prefixes_by_country">mobile telephone prefix</a>. For example, Canada’s MCC is 302, but its telephone prefix is +001.</li>
<li>MNC (Mobile Network Code): the code that represents which carrier you’re using. For example, 410 is one of AT&amp;T’s MNCs.</li>
<li>Cell ID: each cell tower is responsible for serving a small geographic area called a cell, which has a cell ID attached it.</li>
<li>LAC/TAC (“Location Area Code”): in GSM, groups of nearby cells are organized by ID into “Location Areas” (“LA” for short), with each LA’s identifier being referred to as a “Location Area Code”. In 4G these are respectively referred to as Tracking Area (TA) and Tracking Area Code (TAC).</li>
<li>BTS (“base station”): a more general term for devices like cell towers (and CSSs pretending to be cell towers).<sup id="fnref2"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn2" rel="footnote">2</a></sup></li>
</ul>
<p>It’s important to note that some of this terminology varies by network generation. For example, in LTE a base station is referred to as an eNodeB, and in 3G/UMTS the LAC and Cell ID are replaced by PSC (primary scrambling code) and CPI (Cell Parameter ID). For simplicity, we will be sticking to the above terminology.</p>
<h2><a id="OverviewAttacks"></a>Section 3: Overview of attacks</h2>
<p>To be clear, as far as we know no one (outside of government or surveillance tech vendors) has ever gotten their hands on a commercial CSS (e.g. a Harris Corp Stingray) and published publicly available details of its inner workings, so this information all comes from academic literature and the work of open source hackers attempting to reproduce how commercial CSSs might work.</p>
<p>There are three main categories of attacks that will be covered:</p>
<ol>
<li>Communication interception</li>
<li>Denial of service and service downgrading</li>
<li>Location tracking</li>
</ol>
<p>Practical implementation details are left out of the following explanations for the sake of brevity.</p>
<h3><a id="BasicIMSICatcher"></a>Section 3.1: Basic IMSI-catcher</h3>
<p>Classic “IMSI-catchers” simply record nearby IMSIs, and then don’t interact with their target phones in a significant way beyond that. They quite literally “catch” (i.e. record) IMSIs by pretending to be real base stations and then release the target phones (Paget, 2010). Let’s go over how they work in more detail.</p>
<p>In GSM networks, phones will try to connect to whatever base station is broadcasting at the highest signal strength.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21365" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css.png" alt="" width="2400" height="1200" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css.png 2400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css-400x200.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css-1024x512.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css-768x384.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css-1536x768.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css-2048x1024.png 2048w" sizes="(max-width: 2400px) 100vw, 2400px" /></p>
<p>Once a phone has identified a base station as having the best signal strength, it can begin negotiating a connection to it. The base station first asks the phone to send its encryption capabilities to it. If the base station is a CSS rather than a cell tower, it can then either ignore the response or set it to have no encryption.<sup id="fnref3"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn3" rel="footnote">3</a></sup></p>
<p>After this, the base station sends an Identity Request, which the phone responds to with its IMSI. The phone does this because the IMSI is stored on your SIM card, which was issued by your mobile carrier, and the phone network needs to identify that you are in fact a paying customer associated with a mobile carrier. After receiving your IMSI, the CSS then releases your phone back to the real network and moves on to try and capture another phone’s IMSI. That’s all it takes to collect an IMSI from a nearby phone!</p>
<p>&nbsp;</p>
<div class="caption caption-center">
<div class="caption-width-container">
<div class="caption-inner">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21364" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image4imsicatchers.png" alt="" width="1999" height="1000" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image4imsicatchers.png 1999w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image4imsicatchers-400x200.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image4imsicatchers-1024x512.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image4imsicatchers-768x384.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image4imsicatchers-1536x768.png 1536w" sizes="(max-width: 1999px) 100vw, 1999px" /></p>
<p class="caption-text">The CSS sends an Identity Request to collect the target mobile phone’s IMSI. Afterwards, it proceeds to repeat this same action with other phones.</p>
</div>
</div>
</div>
<p>If law enforcement is operating such a CSS in a geographic area, once they’ve obtained the relevant IMSIs, they can then use legal process to get more data on all the users who were present.<sup id="fnref4"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn4" rel="footnote">4</a></sup></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21363" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised.png" alt="" width="2400" height="1200" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised.png 2400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised-400x200.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised-1024x512.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised-768x384.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised-1536x768.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised-2048x1024.png 2048w" sizes="(max-width: 2400px) 100vw, 2400px" /></p>
<p>From here, many more sophisticated attacks can be launched, but that’s how the most basic kind of IMSI-catchers work: they simply collect IMSIs during the connection procedure, then abort the connection procedure and move on to their next target.</p>
<p>In later protocols (e.g. 4G/LTE), phones are a bit smarter about not connecting to any random base station with high signal strength, so an attacker needs more involved techniques to convince a phone to connect to their CSS. See section 3.3 for details.</p>
<h3><a id="Interception"></a>Section 3.2: Communication interception</h3>
<p>As far as we know, communication interception between a mobile phone and a legitimate cell tower is <strong>only possible in GSM</strong> (as opposed to later 3G or 4G protocols). There are two reasons for this:</p>
<ol>
<li>Communicating over GSM doesn’t always require encryption.</li>
<li>Even when encryption is enabled, several of the cryptographic algorithms used in GSM can be broken (and in real time).</li>
</ol>
<p>Imagine that the CSS is trying to launch an active attack where it intercepts a phone’s communications. The CSS must be able to situate itself between the phone and the tower to be able to do so, which is what’s usually referred to as a “machine in the middle” (MitM) attack.</p>
<p>There are two main steps to completing the MitM:</p>
<ol>
<li>Spoofing authentication: the CSS needs to convince the network that it’s actually the targeted mobile phone. (Section 3.2.1)</li>
<li>Deal with any encryption the network tries to set (i.e. disable it or try to break it). (Section 3.2.2)</li>
</ol>
<h4><a id="Spoofing"></a>Section 3.2.1: Spoofing authentication</h4>
<p>Picking up from Section 3.1 where the CSS has already obtained a phone’s IMSI via an Identity Request:</p>
<ol>
<li>The CSS reaches out to a legitimate cell tower with a Location Update Request. This type of request is used to update the cell network about a phone’s location (specifically, its LAC), which the phone needs to do periodically in order for the network to be able to route calls and messages to it quickly.</li>
<li>In response to the Location Update Request, the cell network asks the CSS to identify itself using an Identity Request. The CSS responds using the stolen IMSI.</li>
<li>At this point the tower responds with a cryptographic challenge that requires the secret key Ki (stored on the SIM card) to solve. Since the CSS doesn’t have access to Ki, it passes it onto the phone to solve. The phone solves the challenge, passes it to the CSS, who then passes it back to the network.</li>
<li>After this, the network accepts the connection between it and the CSS as being authenticated.</li>
</ol>
<p>Reminder: this is only applicable to 2G.</p>
<p>&nbsp;</p>
<div class="caption caption-center">
<div class="caption-width-container">
<div class="caption-inner">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21362" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image2imsicatchers.png" alt="" width="1999" height="730" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image2imsicatchers.png 1999w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image2imsicatchers-400x146.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image2imsicatchers-1024x374.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image2imsicatchers-768x280.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image2imsicatchers-1536x561.png 1536w" sizes="(max-width: 1999px) 100vw, 1999px" /></p>
<p class="caption-text">An illustration of steps 1-4 from above on how the CSS is able to complete the authentication MitM.</p>
</div>
</div>
</div>
<h4><a id="Encryption"></a>Section 3.2.2: Dealing with encryption</h4>
<p>There are several encryption algorithms used in GSM, and at a high level, they have names like: A5/1, A5/2, etc &#8230; with A5/0 being used to indicate that no encryption is being used.</p>
<p>If the network tries to specify that it wants to communicate using encryption, the CSS can just respond by saying it doesn’t have encryption capabilities and defaults to A5/0. The CSS has now completed the MitM attack and can read the plaintext messages being sent between the phone and the real network.</p>
<p>Alternatively, if the network decides to use the A5/1 algorithm to communicate, this type of encryption can be broken in real time. The details of this attack are beyond the scope of this post, but you can read about it in the Barkan et al 2006 paper. Additionally, the A5/2 algorithm is so weak that its use <a href="https://en.wikipedia.org/wiki/A5/2">has been banned since 2006</a>. While there are <a href="https://en.wikipedia.org/wiki/KASUMI#Cryptanalysis">known attacks against A5/3</a>, there are no known real-time attacks.</p>
<h4><a id="UserAlert"></a>Section 3.2.3: Why aren’t users alerted that encryption is off?</h4>
<p>At this point, many people ask: why doesn’t their phone tell them something’s up? According to the GSM specifications, cell phone users are supposed to be notified when encryption is disabled, and in some markets they used to be. However, this caused a lot of confusion because:</p>
<ol>
<li>People would travel with their phones to places where cell towers were configured very differently (e.g. in some countries cell network encryption is banned) and it would cause a “Warning: encryption disabled” pop-up to come up a lot.</li>
<li>Cell towers everywhere were misconfigured, also causing this pop-up to appear a lot.</li>
</ol>
<p>These issues led to many confused consumers and support calls to mobile carriers, resulting in the warning ultimately being disabled.</p>
<h4><a id="ServiceDowngrading"></a>Section 3.2.4: Service downgrading</h4>
<p>Even though, as far as we know, communication interception is only possible in GSM, it’s trivial to downgrade a target cell phone’s connection from 3G or 4G to GSM (see Section 3.5 for more information). This is because in general the base station gets to pick whatever configuration settings it wants, which includes the ability to request a protocol downgrade. Alternatively, someone could jam the 3G or 4G bands by pumping lots of white noise into them, making it too noisy to establish a connection, and phones will downgrade in search of a usable signal. LTE service downgrading is covered in detail at the end of Section 3.5.</p>
<h3><a id="LTECSS"></a>Section 3.3: LTE CSS connection techniques</h3>
<p>It’s also important to understand how it’s possible for a CSS to get around the safeguards in LTE and other modern protocols that are meant to stop phones from connecting to any base station with a high enough power.</p>
<p>In GSM, phones are always scanning looking for a tower with a higher signal strength to connect to. However, in LTE if the signal strength is above a certain sufficient threshold, the phone will not scan for other towers to connect to in order to save power.</p>
<p>Additionally, in LTE phones keep track of a “nearest neighbors” list that is broadcast from the tower that they are connected to. If for any reason they lose the connection with the tower they’re connected to (or the ability to connect to it), they’ll try to connect to ones that were advertised in the nearest neighbors list first, before doing a full scan of the available LTE bands for other eligible cell towers.</p>
<p>So, how can an attacker force a phone using LTE into connecting to their CSS? One technique would be to masquerade as a tower in the nearest neighbor’s list (e.g. same frequency, same cell id, etc &#8230;) and transmit at a higher power, so the phone will eventually switch over.</p>
<p>But there is a faster technique! It relies on the fact that LTE frequencies are assigned various priorities (this is referred to as “absolute priority based cell reselection”), and if a phone sees that there is a base station operating on a higher priority frequency than the one it’s on, it must switch to it, regardless of its signal strength. To discover the higher priority frequencies used in a given area, all that’s required is to extract them from the unencrypted configuration messages from base stations, which anyone can monitor (Shaik et al, 2017).</p>
<p>Using these techniques, attackers can probably force even an LTE phone to connect to their CSS, which reveals the phone’s IMSI and allows followup attacks.</p>
<h3><a id="TrackingAttacks"></a>Section 3.4: Location tracking attacks</h3>
<p>Often when the dangers of CSSs are being discussed, the focus is on their communication interception ability. However, in practice the consequences of real time location tracking <a href="https://www.eff.org/deeplinks/2017/05/no-hunting-undocumented-immigrants-stingrays">are often much more severe</a>. The potential for location tracking by your cell provider is unavoidable, so the specific threat model being used here is a 3rd party (such as a law enforcement agency) trying to get your location without cooperation from your cell provider.</p>
<p>There are generally two types of location tracking that CSSs are capable of:</p>
<ol>
<li><strong>Presence testing:</strong> check if a phone is present in or absent from a geographic area (where geographic area usually means a “Location Area” from before, i.e. a group of cells)</li>
<li><strong>Fine-grained location:</strong> figure out the exact or rough GPS coordinates of a phone either through trilateration or by getting the phone to tell the attacker its exact GPS coordinates</li>
</ol>
<h4><a id="PresenceTesting"></a>Section 3.4.1: Presence Testing in LTE</h4>
<p><strong><em>Passive Presence Testing</em></strong></p>
<p>The simplest way to do presence testing in LTE doesn’t actually require someone to have what we usually consider a CSS (e.g. a device that pretends to be a legitimate cell tower). Instead, all that’s required is simple radio equipment to scan the LTE frequencies, e.g. an antenna, an SDR (Software Defined Radio), and a laptop. Passive presence testing gets its name because the attacker doesn’t actually need to do anything other than scan for readily available signals (Shaik et al, 2017).</p>
<p>A fundamental aspect of wireless technology is the paging model. When the network has a message it wants to route to a phone, it sends an “RRC paging message” which is received by every phone listening to their carrier’s paging frequency in that area (which is basically every phone),<sup id="fnref5"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn5" rel="footnote">5</a></sup> asking for that particular phone to contact the base station to negotiate completing a connection to receive a call or message. Thus, phones are constantly listening for RRC paging messages and receiving and discarding ones not addressed to them.</p>
<p>RRC is short for Radio Resource Control, which is the protocol used to communicate between a cell phone and a base station. The RRC takes care of connection establishment and paging notifications that you’re getting a message or phone call, among other things.</p>
<p>The exact way paging works varies based on several factors, including the type of message the network is trying to route to you. For example, say the network is trying to route a phone call to you. Phone calls are considered high priority (since there’s someone on the other side waiting for you to connect), so the network notifies every cell tower in the last Location Area your phone was in to send out the RRC paging message addressed to your phone (as opposed to only the last cell tower the phone was using). More on this later!</p>
<p>RRC paging messages are usually addressed to a TMSI, but sometimes IMSI and IMEI are also used. By monitoring these unencrypted paging channels, anyone can record the IMSIs and TMSIs the network believes is in a given area. In the next section, we’ll see how an attacker can correlate a TMSI to a specific target phone, as right now collecting TMSIs simply means recording pseudonyms.</p>
<p>Additionally, phones periodically transmit unencrypted messages about their location and measurements of cell service quality that anyone with the right equipment can easily intercept. Sometimes these messages contain the phone’s exact GPS location, but usually the information about the signal strength of nearby cells is enough to calculate the phone’s location. We’ll look at these measurement reports in detail in the Exact GPS Coordinates section below.</p>
<p><strong><em>Semi-Passive Presence Testing</em></strong></p>
<p>Semi-passive means that the attacker only uses network functions in ways in which they are meant to be used. An example of what it means for an adversary to be “semi-passive”: the attacker can text the person they’re trying to track (assuming they know their phone number) in order to generate a paging message being sent to their phone, but they can’t go and send malicious or malformed data to phones or towers in the area (Shaik et al, 2017).</p>
<p>In this section, we are going to cover two location attacks: one which checks for a phone in a given Location Area (“Basic Location Area Test”), and one which checks for a phone connected to a specific cell tower (the “Smart Paging Test” method, which has a much smaller radius of use).</p>
<p><strong><em>Basic Location Area Test</em></strong></p>
<p>The first step of a basic Location Area test is to trigger about 10-20 notifications to the target’s phone via phone calls while also monitoring the RRC paging messages that are sent out. To not alert the user, the attacker can almost immediately hang up after initiating the call so that the paging message makes it to the phone, but the user doesn’t actually get an incoming call notification.</p>
<p>Because there’s someone waiting on the other line to connect to you, phone calls are considered higher priority, so the network notifies every cell tower in the last Location Area the phone was in to send out the RRC paging message (as opposed to only the last cell tower the phone was using). The attacker can then use set intersection analysis (explained in <sup id="fnref6"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn6" rel="footnote">6</a></sup>) with their well-timed calls to figure out the target’s TMSI from the RRC messages.</p>
<p>&nbsp;</p>
<div class="caption caption-center">
<div class="caption-width-container">
<div class="caption-inner">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21360" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image7imsicatchers.png" alt="" width="1999" height="1000" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image7imsicatchers.png 1999w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image7imsicatchers-400x200.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image7imsicatchers-1024x512.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image7imsicatchers-768x384.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image7imsicatchers-1536x768.png 1536w" sizes="(max-width: 1999px) 100vw, 1999px" /></p>
<p class="caption-text">CSS triggering many RRC paging requests to determine if a phone is in a given LA.</p>
</div>
</div>
</div>
<p><strong><em>Smart Paging Test</em></strong></p>
<p>Usually the radius of a Location Area is quite large, so from here the attacker can use something referred to as “smart paging” (explained below) to figure out the exact cell tower the target is using (which translates to knowing the user’s location within a ~2 km radius) (Shaik et al, 2017).</p>
<p>Because general data messages (e.g. WhatsApp and FB Messenger messages) are not high priority, the network initially only broadcasts paging messages for them from the last tower the phone was known to be connected to (this is referred to as “smart paging”). Thus, once the attacker has confirmed the target’s location in a TA (“Tracking Area”), they can test various cells to find the target’s cell. (Note: we’re switching briefly from the “Location Area” terminology to “Tracking Area” here for the sake of a concept covered below.) Similar to before, they send timed WhatsApp or FB Messenger messages and use set intersection analysis to verify the TMSIs being sent in RRC messages in that cell.<sup id="fnref7"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn7" rel="footnote">7</a></sup></p>
<p>Note that in order for this to work, the attacker needs to either have equipment in every cell (which is expensive), or move about through cells repeating this procedure until they get a match.</p>
<h4><strong><a id="ActiveLocationTracking"></a>Section 3.4.2: Active location tracking and exact GPS coordinates</strong></h4>
<p>In this section, the attacker’s assumed goal is to find the target’s exact or rough GPS coordinates. In this section, we’ll be describing active attacks, meaning ones in which the attacker can use any means available to them to figure out their target’s information, including operating a CSS and sending malicious or false information to the phone or other cell towers.</p>
<p>In this scenario, suppose the attacker has a CSS and they’ve managed to lure their target into trying to connect using techniques described in Section 3.3. After completing the initial connection procedure steps, the phone enters into a CONNECTED state.</p>
<p>Now the attacker creates a “RRC Connection Reconfiguration” command, which contains the cell IDs of at least 3 neighbouring cell towers and their connection frequencies and sends this command to their target’s phone.</p>
<p>Usually, the “RRC Connection Reconfiguration” command is used to modify an existing connection to a base station, but the attacker is only interested in the target phone’s initial response to its message. This response contains the signal strengths of the previously specified cell towers, which can then be used to find the phone’s location via trilateration:</p>
<p>&nbsp;</p>
<div class="caption caption-center">
<div class="caption-width-container">
<div class="caption-inner">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21359" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised.png" alt="" width="2400" height="1200" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised.png 2400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised-400x200.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised-1024x512.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised-768x384.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised-1536x768.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised-2048x1024.png 2048w" sizes="(max-width: 2400px) 100vw, 2400px" /></p>
<p class="caption-text">In short, trilateration involves calculating the intersection of circles drawn around the previously specified cell towers, where the radius of each circle is a function of the reported signal strength. Note: trilateration is different than triangulation.</p>
</div>
</div>
</div>
<p>For newer phones and networks which support the “locationInfo-r10” feature, this report will also contain the phone’s exact GPS coordinates, meaning no trilateration calculations are required. The exact GPS coordinates are just a field in the response (Shaik et al, 2017).</p>
<p>In addition to the technique described above, there is another way to get similar trilateration and GPS data by using RLF (“Radio Link Failure”) reports, but we will not cover it in any detail as it’s similar to the techniques just covered.</p>
<h3><a id="DoSDowngrading"></a>Section 3.5: Denial of Service and Downgrading</h3>
<p>Cell network denial of service and protocol downgrade attacks are possible (and can have quite similar implementation details, as we’ll see below). Additionally, downgrade attacks make it such that a target phone can be forced down to a less secure protocol, where more severe privacy invasive attacks can be launched.</p>
<h4><a id="ProtocolDowngrade"></a>Section 3.5.1: Protocol downgrade attacks</h4>
<p>Suppose that the attacker has set up their CSS and tricked the target into trying to connect (which was covered in Section 3.3). After the initial connection procedure, the phone will send a “Tracking Area Update Request” (“TAU” for short). This kind of message is used by the phone to keep the cell network updated about the phone’s most recent location, so that the network can route calls to it faster. TAU Requests are usually sent by phones whenever they’re connecting to a new base station.</p>
<p>The CSS responds with a “TAU Reject” message. Within the Reject message is something referred to as the “EMM cause numbers”, which indicates why the message was rejected. In this case, the attacker sets it to 7 (“LTE services not allowed”).</p>
<p>Upon receiving this EMM value, the phone deletes all information it had about the previous real network it was connected to, and then puts itself in a state where it considers its SIM card to be invalid for LTE. It then searches for 3G and GSM networks to connect to, and will not again try to negotiate an LTE connection until it is rebooted (Shaik et al, 2017).</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21358" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image6imsicatchers.png" alt="" width="1999" height="1000" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image6imsicatchers.png 1999w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image6imsicatchers-400x200.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image6imsicatchers-1024x512.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image6imsicatchers-768x384.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image6imsicatchers-1536x768.png 1536w" sizes="(max-width: 1999px) 100vw, 1999px" /></p>
<p>The key reason why protocol downgrade attacks are so bad is that it renders LTE-capable phones vulnerable to attacks that normally only work on earlier protocols (e.g. the communication interception from Section 3.2).</p>
<h4><a id="DoS"></a>Section 3.5.2: Denial of Service (DoS)</h4>
<p>If the attacker is looking to launch a large scale DoS attack, the simplest thing is to jam the LTE frequencies by pumping them full of white noise. However, there are also techniques for DoS attacks that only target individual phones.</p>
<p>Launching a denial of service attack against an individual phone is exactly the same as the protocol downgrade attack described above, except the CSS responds with EMM cause number 8 (“LTE and non-LTE services not allowed”). The phone then puts itself in a state where it does not try to negotiate any network connections until it’s been rebooted.</p>
<p>Additionally, there has been some research done into denying select network services (e.g. only allowing SMS, and disallowing calls and data), but for the sake of space we will not be covering this. Please see Shaik et al, 2017 below for details.</p>
<h2><a id="Detection"></a>Section 4: Detection methods &amp; apps</h2>
<p>At this point you’re probably wondering:</p>
<ul>
<li>Are there ways to detect CSSs?</li>
<li>How to defend oneself from a CSS?</li>
<li>What led to these vulnerabilities in the cell networks and what do we do about them?</li>
</ul>
<p>These are three questions we’re going to explore in this section, and unfortunately they don’t have simple answers.</p>
<h3><a id="Methods"></a>Section 4.1: Detection methods</h3>
<p>To reiterate an important truth from before: a fundamental problem when researching detection methods is that <strong>we don’t know how commercial CSSs work</strong>. Instead we rely on how we think they might work based on research findings. It’s important to keep this in mind when going over some of the known detection methods below. This following list is not exhaustive, and instead is meant to be an introduction to this topic.</p>
<p><strong>Unusual base station parameters or fingerprints</strong></p>
<ul>
<li>There’s been some speculation that commercial CSSs mask themselves as cell towers that are normally in the area, but with some configuration parameters or characteristics being subtly off (e.g. broadcast power is suddenly much higher), enough so that the “fingerprint” of the tower is different. While configuration parameters and other characteristics differ across network operators, they’re usually uniform across a specific operator (Dabrowski et al, 2014).</li>
</ul>
<p><strong>Missing normal base station capabilities</strong></p>
<ul>
<li>It’s unlikely that a CSS manufacturer will have implemented the full set of capabilities of a normal base station. Missing capabilities, such as not broadcasting certain standard System Information Broadcast (SIB) messages, being unable to respond to certain standard requests, or there being very little to no paging traffic coming from the base station might be indicators of a CSS (Dabrowski et al, 2014).</li>
</ul>
<p><strong>Ephemerality</strong></p>
<ul>
<li>It’s generally believed that CSSs don’t stay in a single place for a significant period of time, and so a base station appearing for only a short period of time could be worth investigating. However, there are also many completely normal reasons why something would only appear for a short period of time. For example, it could simply be testing equipment, or if there’s a large event happening, it could be there to help facilitate the increased traffic load.</li>
</ul>
<p>The cell landscape is ever changing. Large scale and long term data collection is the best way to survey an area to be able to determine what’s normal versus what’s unusual. The <a href="https://seaglass.cs.washington.edu/">University of Washington’s Sea Glass project</a> is a great example of this.</p>
<p>You can read much more about this topic in Dabrowski et al’s IMSI-Catch Me If You Can: IMSI-Catcher-Catchers. To reiterate, while these could be indicators that something’s amiss, there are also many completely normal reasons (that have nothing to do with surveillance) as to why we’d be seeing unusual behaviour. E.g. testing equipment, temporary equipment brought in for a large event (e.g. at a sporting event), a cell tower crashed and upon restarting broadcasts temporarily incorrect values until it’s completely finished restarting, and so on.</p>
<h3><a id="Apps"></a>Section 4.2: Detection apps</h3>
<p>Many apps have been released that claim to alert users when it seems likely they’re connected to a CSS. The most popular ones include: <a href="https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector/wiki">Android IMSI-Catcher Detector (AIMSICD)</a>, <a href="https://opensource.srlabs.de/projects/snoopsnitch">SnoopSnitch</a>, <a href="https://sitch.io/">Sitch</a>, <a href="https://play.google.com/store/apps/details?id=kz.galan.antispy">GSM Spy Finder</a>, <a href="https://play.google.com/store/apps/details?id=com.skibapps.cellspycatcher&amp;hl=en_US">Cell Spy Catcher</a>. The quality of these apps varies, and some are still popular despite no longer being maintained.</p>
<p>Most of these apps implement at least some of the detection methods listed above and in Dabrowski et al. Even though sometimes multiple apps will have implemented the same detection methods, they won’t necessarily produce the same result when evaluating if a particular base station is suspicious or not (Borgaonkar et al, 2017). Let’s look at some examples of how detection apps have failed to include basic detection heuristics, as well as how there could be discrepancies in the evaluations they produce.</p>
<p><em>Varying power levels</em></p>
<p>One of the previously described detection methods is to track if a tower you’ve seen before suddenly broadcasts at much higher power. In Borgaonkar et al’s <em>White-Stingray: Evaluating IMSI Catchers Detection Applications</em>, researchers analyzed four of the previously mentioned apps and found that while most of them stored regular measurements of BTS power levels, none of them compared new values to historical values. This means that none of the apps could detect when towers had an unusually high broadcast power.</p>
<p><strong><em>LAC change</em></strong></p>
<p>As we saw in Section 3.2.1, when phones move to a new Location Area (or when they’re in the process of connecting to a base station that’s advertising as having a different LAC), they’ll need to update their information. As a result, they’ll eventually respond to an <em>Identity Request</em> (the command that reveals a phone’s IMSI). It’s generally believed that CSSs advertise as having a different LAC than the one that corresponds to the area they’re in, allowing them to exploit this mechanism to force phones to hand over their IMSIs or connect to them.</p>
<p>All previously mentioned detection apps monitor for LAC changes. As Borgaonkar et al point out, one of them checks to see if the LAC matches that of neighbouring base stations, and displays a warning to the user when it’s close to the edge of an LA. Since LAC changes are common when the user is near the edge of a LA, these warnings are often false positives. Another app stores all LACs the phone has seen before, and sends out warnings whenever a new one appears, meaning false positive warnings are constantly sent out when the user travels to new places. Another app defaults to marking anything broadcasting a LAC value between 0-9 as suspicious. This is an example of how even though all the detection apps have heuristics for detecting if a base station is suspicious based on a determination that a required value (the LAC) is unusual, their interpretations of how to do this and their implementations vary so much that they produce different results.</p>
<p>Because we don’t have global standards for what’s normal, and because things vary so wildly by country, carrier, etc, it’s difficult to come up with heuristics that could universally work for detecting CSSs. As a result, the apps that have attempted to tackle this problem so far have ended up having dramatically different thresholds for alerts.</p>
<h3><a id="Defending"></a><strong>Section 4.3: Defending against CSSs</strong></h3>
<p>CSSs have such a wide range of capabilities (based on what we know about possible cell network attacks they could be based on) that there is no feasible way to defend against all of the things they can do. Defense should begin by considering what someone’s specific threat model is and coming up with ways to defend after that.</p>
<p><strong><em>Examples</em></strong></p>
<p>At the time of writing, there are no publicly known confirmed examples of CSSs being used by law enforcement for communication interception or service denial. However, there are <a href="https://www.detroitnews.com/story/news/local/detroit-city/2017/05/18/cell-snooping-fbi-immigrant/101859616/">quite</a> <a href="http://cnsmaryland.org/interactives/spring-2016/maryland-police-cell-phone-trackers/index.html">a few</a> <a href="https://shadowproof.com/2019/05/08/detroit-police-spent-more-than-half-million-dollars-on-cell-site-simulator-to-track-peoples-locations/">examples</a> of CSSs being used for location tracking.</p>
<p>Since the main threat CSSs pose is that of real time location tracking, and there are no adjustable user settings one can change to affect this, there are currently no immediate steps one can take to defend themselves against these devices, other than either not having a cell phone, (which isn’t a reasonable option for many of us) or turning off and/or leaving behind your phone when doing something important.</p>
<p>Despite that, there are many steps you can take to defend against online surveillance, many of which we’ve outlined in EFF’s <a href="https://ssd.eff.org/">Surveillance Self Defense Guide</a>.</p>
<h2><a id="Conclusion"></a>Conclusion: the past &amp; future of cell network security</h2>
<p>The intersection of cell networks, security, and user privacy has historically not been an accessible field, but that’s slowly changing. Each year there is more research in this field being published and open source projects (such as <a href="https://github.com/srsLTE/srsLTE">srsLTE</a>) that enable this research are improving dramatically—and more people are starting to question why more work isn’t being done to fix these issues.</p>
<p>Cell network security <a href="https://www.nytimes.com/2018/12/26/opinion/cellphones-security-spying.html">is broken in some pretty fundamental ways</a>. It’s up to all of us over the next few years to demand lawmakers pay closer attention to the issue, and to put pressure on standards groups, carriers, network operators, and vendors to make necessary improvements. Together, we can protect and defend users’ privacy.</p>
<h2><a id="References"></a>References</h2>
<p><em>IMSI-Catch Me If You Can: IMSI-Catcher-Catchers.</em> Adrian Dabrowski, Nicola Pianta, Thomas Klepp, Martin Mulazzani, Edgar Weippl. <a href="https://www.sba-research.org/wp-content/uploads/publications/DabrowskiEtAl-IMSI-Catcher-Catcher-ACSAC2014.pdf">https://www.sba-research.org/wp-content/uploads/publications/DabrowskiEtAl-IMSI-Catcher-Catcher-ACSAC2014.pdf </a>(Dabrowski et al, 2014)</p>
<p><em>IMSI Catcher Detection Apps Might Not Be All That Good, Research Suggests.</em> Joseph Cox. <a href="https://www.vice.com/en_us/article/neeb5g/stingray-detection-apps-might-not-be-all-that-good-research-suggests">https://www.vice.com/en_us/article/neeb5g/stingray-detection-apps-might-not-be-all-that-good-research-suggests</a></p>
<p><em>Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication</em>. Elad Barkan, Eli Biham, Nathan Keller. <a href="http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/2006/CS/CS-2006-07.pdf">http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/2006/CS/CS-2006-07.pdf </a>(Barkan et al, 2006)</p>
<p><em>Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems.</em> Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi§and Jean-Pierre Seifert. <a href="https://arxiv.org/pdf/1510.07563.pdf">https://arxiv.org/pdf/1510.07563.pdf </a>(Shaik et al, 2017)</p>
<p><em>Practical Cellphone Spying</em>. Kristen Paget. Defcon 18. <a href="https://www.youtube.com/watch?v=fQSu9cBaojc">https://www.youtube.com/watch?v=fQSu9cBaojc </a>(Paget, 2010)</p>
<p><em>White-Stingray: Evaluating IMSI Catchers Detection Applications.</em> Ravishankar Borgaonkar, Andrew Martin, Shinjo Park, Altaf Shaik, Jean-Pierre Seifert. <a href="https://ora.ox.ac.uk/objects/uuid:15738ed0-c144-49e9-a4fa-466362cf7754">https://ora.ox.ac.uk/objects/uuid:15738ed0-c144-49e9-a4fa-466362cf7754 </a>(Borgaonkar et al, 2017)</p>
<h2>Notes</h2>
<ol>
<li id="fn1">The name “3GPP” is confusing since it contains “3G”. While they didn’t exist when GSM (a 2G technology) was originally being developed, they did later absorb some of the organizations that were responsible for developing GSM. It is still one of the main organizations that develops and maintains existing and future protocols. <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref1" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
<li id="fn2">Unfortunately, most phones usually don’t have an ability to specify connection settings. Recently some phones have begun to implement features like “use LTE only” though. <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref2" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
<li id="fn3">Unfortunately, most phones usually don’t have an ability to specify connection settings. Recently some phones have begun to implement features like “use LTE only” though. <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref3" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
<li id="fn4">According to the Department of Justice, some CSSs can directly collect a subscriber’s phone number, meaning LE can skip the step of subpoenaing a service provider to obtain the subscriber’s phone number. See page 6 of https://www.eff.org/files/2015/11/30/illinois.dist_.ct_.stingrays.pdf. <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref4" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
<li id="fn5">Generally, the network will first direct the message to the last known cell tower the phone was connected to, and that tower will send out a paging message to everyone listening on its paging frequency. If it doesn’t get a response, then it will spread out and try all the towers in a given Location Area, and so on. The exact details of how this works varies by type of data being routed (e.g. SMS vs phone call vs LTE data message) and by carrier. <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref5" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
<li id="fn6">Basically, you compare the paging identities in the RRC messages sent out after each short call you initiate, and extract the value(s) that are repeated the number of times you placed calls. You can read a much more here in the R<em>evealing Identities</em> section here: <a href="https://www-users.cs.umn.edu/~hoppernj/celluloc.pdf">https://www-users.cs.umn.edu/~hoppernj/celluloc.pdf</a> <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref6" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
<li id="fn7">Note that Facebook messages have the advantage of not needing to know your target’s phone number to be able to trigger a notification being sent to their phone! (The attacker doesn’t need to be Facebook friends with their target either, as Facebook Messenger messages sent to strangers end up in the ‘Other’ folder, but still trigger LTE push notifications that aren’t displayed to the user.) <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref7" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
</ol>
</div>
</div>
</div>
</div>
</article>
</div>
<div class="panel-pane pane-entity-field pane-node-field-attachments">
<h2 class="pane-title">Downloads</h2>
<div class="field field--name-field-attachments field--type-file field--label-hidden">
<div class="field__items">
<div class="field__item even"><span class="file"><img decoding="async" class="file-icon" title="application/pdf" src="https://www.eff.org/modules/file/icons/application-pdf.png" alt="PDF icon" /> <a title="whitepaper_imsicatchers_eff.pdf" href="https://www.eff.org/files/2019/07/09/whitepaper_imsicatchers_eff_0.pdf" type="application/pdf; length=999909">Gotta Catch &#8216;Em All</a></span></div>
</div>
</div>
</div>
<p><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks" target="_blank" rel="noopener">source</a></p>
<hr />
<div class="editor-content title-wrap">
<h1 class="h1 ">Understanding and Detecting IMSI Catchers around the World</h1>
</div>
<p>One of the good things about working in the area of core network security, is the opportunity to find new and unexpected types of attacks. These are attacks you didn’t even know could happen, much less have a chance to prevent. Finding these unexpected attacks doesn’t just happen though, it requires experience and investigation, but most importantly it needs the mindset to dig deeper into any strange events that are encountered, and try to understand them, rather than just assuming they are random malicious events.</p>
<p>In this particular case, we are discussing IMSI Catchers. First off, the term IMSI catcher is a misused and sometimes contradictory term however. As explained <a href="https://www.eff.org/pages/cell-site-simulatorsimsi-catchers" target="_blank" rel="noopener">here</a>, there are actually 2 types of equipment that those in the public (and many in the industry) would conflate into what they would call IMSI catchers.</p>
<ul>
<li>‘Active’ IMSI Catchers, also termed Cell Site Simulators (CSS) or Fake Base Stations – these attempt to force local devices to connect to a Call Site Simulator, in order to decrypt the conversation and texts, and to execute man in the middle interception. These would be considered the more ‘traditional’ type of IMSI catchers most would be aware of. Stingrays are also a common term used for these (named after the brand built by Harris Corporation). A good overview of how the Active IMSI /Cell Site Simulators work is <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks" target="_blank" rel="noopener">here</a>.</li>
<li>Passive IMSI Catchers – these passively listen into the paging of mobile devices as they move and register to new real Cell towers in the local area, in order to get the IMSI numbers of these devices. They are far less precise, and are unable to do any of the more sophisticated type of interception, but involve no interaction between the mobile device and the IMSI Catcher. An overview of how these could work, and how they function is <a href="https://harrisonsand.com/posts/imsi-catcher/" target="_blank" rel="noopener">here</a>.</li>
</ul>
<picture class="wp-image-82879 aligncenter"><source srcset="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1.png.webp 932w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-300x100.png.webp 300w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-768x257.png.webp 768w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-546x183.png.webp 546w" type="image/webp" sizes="(max-width: 800px) 100vw, 800px" data-lazy-srcset="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1.png.webp 932w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-300x100.png.webp 300w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-768x257.png.webp 768w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-546x183.png.webp 546w" /><img loading="lazy" decoding="async" class="entered lazyloaded" src="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1.png" sizes="(max-width: 800px) 100vw, 800px" srcset="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1.png 932w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-300x100.png 300w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-768x257.png 768w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-546x183.png 546w" alt="two diagrams showing the difference between active IMSI Catcher and Passive IMSI Catcher" width="800" height="268" data-lazy-srcset="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1.png 932w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-300x100.png 300w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-768x257.png 768w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-546x183.png 546w" data-lazy-sizes="(max-width: 800px) 100vw, 800px" data-lazy-src="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1.png" data-ll-status="loaded" /></picture>
<p>The primary difference between these two is that the more traditional Active IMSI Catcher/CSSs always involves some form of interaction with the mobile device, whereas the Passive IMSI Catcher doesn’t – it literally just listens in to the paging that occurs in the local areas as the mobile device changes between legitimate cell towers in the vicinity. This makes a big difference when it comes to detection of these IMSI Catcher types.</p>
<p>A lot of research has gone into various ways of detecting Active IMSI Catchers, by looking at how they differ from real Cell towers. One distinctive example of what an Active IMSI Catcher might do is the forced downgrading of their target mobile device to use a less secure radio interface. This detection of an Active IMSI Catchers can be difficult, involves a lot of local measurements and often can and has in the past led to false positives, but it gives some results. From the attacker’s perspective it’s also a trade-off in that they must make the effort to physically deploy an Active IMSI Catchers in a sensitive area, and then hope its radio activity doesn’t give it away. This is often why more sophisticated attackers may often resort to using attacks over signalling interfaces such as SS7 and Diameter to achieve their aims, which can be sent from any part of the world.</p>
<p>A Passive IMSI Catcher changes things somewhat. It still involves physical deployment of a system to listen in the local targeted area, but it is essentially undetectable on the radio interface, as it emits nothing that would allow it to be detected. This makes it very valuable to perform long-term surveillance in sensitive areas, when the goal is to have the least chance of being detected, while still trying to determine the IMSIs of who is in the local area.</p>
<p>The issue with both types of IMSI Catchers, from the attacker’s perspective, is that what they are left with are a collection of IMSIs from around the world. While this information may be useful, often you need more information to profile who has been ‘caught’. For Active IMSI Catcher deployments; the attackers may also intercept calls/text messages etc, so have a better idea of the target, but for passive IMSI catchers they won’t have that. What the attackers really need is the co-corresponding phone number – the MSISDN of the mobile device associated with the IMSI – in order to truly figure out the identities of the mobile device their IMSI catcher has caught.</p>
<p>This is where our analysis and investigation has come in. Over time, we have been seeing patterns of unusual requests over the SS7 interface, for particular IMSIs. Specifically, what we have been seeing is our Signalling Firewalls, deployed at multiple customer mobile operators, receiving suspicious MAP_RESTORE_DATA packets for IMSIs from unexpected sources. A MAP_RESTORE_DATA packet is a particular command that requests that the home operator sends details for a particular IMSI to the roamed-to network. Details in this case includes MSISDN (the actual phone number), call forwarding setting and other specific information. Further investigation showed that we always received this command when these IMSIs were near or attached to specific Cell Sites while roaming in a 3rd country and nowhere else.</p>
<picture class="wp-image-82881 aligncenter"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21343" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMSI_Catcher_sequence_wide-1536x662.png.webp" alt="" width="1536" height="662" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMSI_Catcher_sequence_wide-1536x662.png.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMSI_Catcher_sequence_wide-1536x662.png-400x172.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMSI_Catcher_sequence_wide-1536x662.png-1024x441.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMSI_Catcher_sequence_wide-1536x662.png-768x331.webp 768w" sizes="(max-width: 1536px) 100vw, 1536px" /></picture> <picture class="wp-image-82881 aligncenter"><source srcset="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide.png.webp 1985w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-300x129.png.webp 300w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1024x441.png.webp 1024w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-768x331.png.webp 768w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1536x662.png.webp 1536w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-546x235.png.webp 546w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1060x457.png.webp 1060w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1002x432.png.webp 1002w" type="image/webp" sizes="(max-width: 800px) 100vw, 800px" data-lazy-srcset="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide.png.webp 1985w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-300x129.png.webp 300w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1024x441.png.webp 1024w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-768x331.png.webp 768w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1536x662.png.webp 1536w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-546x235.png.webp 546w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1060x457.png.webp 1060w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1002x432.png.webp 1002w" /></picture>
<p>Our working theory, is that what we are observing is what we now call “<strong>IMSI Profilers</strong>”. These IMSI Profilers work in conjunction with IMSI Catchers – they take the list of IMSIs that have been detected and request profile information, in order to feed these phone numbers back to the IMSI catcher operator. The sequence of events that we believe to happen is shown above. From log analysis it also seems likely (but can’t be confirmed 100%) that the IMSI Catcher in the 3rd country is of the passive variety. In this particular case, the IMSI Profiler is using a source SS7 address (called a SCCP Global Title or GT) in a small European mobile operator that we have detected previously in our SIGIL/Signalling Intelligence system to be used by multiple surveillance companies, further confirming our suspicion that it is malicious.</p>
<p>Regardless of the IMSI catcher type used, this method of analysing incoming suspicious signalling activity gives the opportunity for mobile operators to partially protect their subscribers against IMSI Catchers around the world, something they didn’t have in the past. It won’t stop an Active IMSI Catcher from forcing a subscriber to connect to them, but it would stop additional information being retrieved. And in the case of passive IMSI catcher it is potentially one of the <strong>only ways</strong> to detect these remotely and block any more useful information being obtained.</p>
<p>In the long term, improvements in the new 5G radio and core network standards means that mobile operators should be able to greatly improve the ability to block IMSI Catchers over 5G. If these are implemented correctly and no loopholes are introduced then effective 5G IMSI Catchers may never arise. In the interim however, IMSI Catchers – both Passive and Active – are being used globally in the world to track and record individuals without their consent. By analysing incoming signalling traffic, and detecting and blocking these IMSI Profilers, mobile operators now have the opportunity to help protect their subscribers globally, regardless of how stealthy the IMSI Catcher is. <a href="https://www.enea.com/insights/adaptive-mobile-imsi-catchers/" target="_blank" rel="noopener">source</a></p>
<hr />
<div class="et_pb_row et_pb_row_1_tb_body">
<div class="et_pb_column et_pb_column_3_5 et_pb_column_3_tb_body et_pb_css_mix_blend_mode_passthrough et-last-child">
<div class="et_pb_module et_pb_post_title et_pb_post_title_0_tb_body et_pb_bg_layout_light et_pb_text_align_left">
<div class="et_pb_title_container">
<h1 class="entry-title">How to Catch an IMSI Catcher</h1>
</div>
</div>
<div class="et_pb_module et_pb_text et_pb_text_1_tb_body article-excerpt et_pb_text_align_left et_pb_bg_layout_light">
<div class="et_pb_text_inner">IMSI catchers, or fake antennas, are a common cell phone surveillance method. The FADe project helped local NGOs in Latin America detect and document these devices.</div>
</div>
<div class="et_pb_module et_pb_text et_pb_text_3_tb_body et_pb_text_align_left et_pb_bg_layout_light">
<div class="et_pb_text_inner"></div>
</div>
</div>
</div>
<div class="et_pb_row et_pb_row_2_tb_body">
<div class="et_pb_column et_pb_column_4_4 et_pb_column_4_tb_body et_pb_css_mix_blend_mode_passthrough et-last-child">
<div class="et_pb_module et_pb_post_content et_pb_post_content_0_tb_body news-body">
<h2 class="wp-block-heading"><strong>Civil Society Needs Help Catching IMSI Catchers </strong></h2>
<p>Law enforcement, criminals, and repressive governments monitor cell phone signals for the purpose of counter-terrorism, espionage, or political persecution. One common surveillance method is the placement of fake antennas—or <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#BackgroundInfo" target="_blank" rel="noreferrer noopener">IMSI catchers</a>—which imitate legitimate cell towers in order to track individual mobile subscribers, monitor their communications, or even disable their network connections.</p>
<p>In a high-profile example, <a href="https://nomada.gt/pais/la-corrupcion-no-es-normal/espionaje-ilegal-del-gobierno-aqui-esta-la-investigacion-de-nuestro-diario-parte-i/" target="_blank" rel="noreferrer noopener">a Guatemalan investigation revealed</a> large-scale <a href="https://www.eff.org/deeplinks/2018/12/where-government-hack-their-own-people-and-people-fight-back-latin-american" target="_blank" rel="noreferrer noopener">illegal spying</a> targeting “activists, entrepreneurs, politicians, journalists, diplomats, and social leaders.” Many governments engage in similar practices, often <a href="https://privacyinternational.org/strategic-areas/contesting-government-data-and-system-exploitation" target="_blank" rel="noreferrer noopener">without any meaningful oversight</a> or accountability.</p>
<p>The battle against authoritarian or illegal spying demands a range of methodologies—from legal policies and telecommunications regulations to physical interventions like “Faraday bags,” which shield devices in a casing that blocks electromagnetic transmissions. But the fight between eavesdroppers and victims (often human rights defenders) is not an even one. Most civil society organizations lack the equipment or expertise to effectively monitor phone surveillance.</p>
<h2 class="wp-block-heading"><strong>Equipping Civil Society with Resources to Expose Surveillance</strong></h2>
<p>To help Latin American NGOs level the playing field, <a href="http://www.southlighthouse.org/" target="_blank" rel="noreferrer noopener">South Lighthouse</a> created the <a href="http://fadeproject.org/" target="_blank" rel="noreferrer noopener">Fake Antenna Detection project (FADe)</a>, with support from Open Technology Fund’s <a href="https://www.opentech.fund/funds/internet-freedom-fund/" target="_blank" rel="noreferrer noopener">Internet Freedom Fund</a>. The project’s primary focus was detecting and documenting IMSI catchers—surveillance devices that imitate legitimate cell towers in order to track individual mobile subscribers, monitor their communications, or even disable their network connections.</p>
<p>The FADe team provided training, equipment, and other support to enable local partners to scan for IMSI catchers, analyze their findings and, ideally, make use of the results for advocacy. “A fundamental principle of the program has been partnership and capacitation,” says Andrés Schiavi, Executive Director of South Lighthouse.</p>
<p>FADe’s technology coordinator, Carlos Guerra says, “We wanted to open up a discussion for NGOs about how cell technology works and about how it <em>should</em> work to ensure optimal benefits to people’s safety and people’s rights.”</p>
<p>Using methods initially developed by the <a href="https://seaglass.cs.washington.edu/" target="_blank" rel="noreferrer noopener">SEAGLASS</a> project at the University of Washington and the <a href="https://www.eff.org/pages/crocodile-hunter" target="_blank" rel="noreferrer noopener">Electronic Frontier Foundation (EFF)</a>, FADe partners assembled simple sensors using a few off-the-shelf electronics, a smartphone, and a “feature phone” (a basic device resembling an early mobile phone that is usually more affordable and durable than a smartphone). The sensor setup sits in a moving vehicle and collects signal information over several weeks from local cell towers.</p>
<p>By analyzing the resulting data, groups can differentiate between signals consistent with legitimate cell towers and signals showing anomalous behaviors, such as a “tower” that changes locations (see animation below); or only operates during certain times; or uses frequencies or signal parameters not used anywhere else in the network. Another common warning sign is suspicious instructions sent to a device, such as a request to disconnect from all other towers, or a command to downgrade from 3G or 4G to a 2G network, which will make the device more vulnerable to surveillance.</p>
<p><em>A specific cell tower physically moving among different locations is one of the anomalous behaviors that can help identify an IMSI-catcher.</em></p>
<p>But analysis of these signals can be tricky, says Guerra. “There is no cookie-cutter method,” he says. The data is “noisy,” and cell providers configure their towers differently. It takes many days of monitoring to set a baseline that helps distinguish between legitimate and fake antennas.</p>
<p>The FADe team began working with local organizations in 2018. To mitigate technical and security risks, Schiavi says the first FADe partners were drawn from among South Lighthouse’s network of Latin American organizations. But interest grew rapidly, he says, in part because nothing comparable to the FADe/SEAGLASS approach had ever been available to these organizations. From 2019 to 2022, FADe worked with partners in <a href="https://fadeproject.org/?page_id=38" target="_blank" rel="noreferrer noopener">nine different countries</a>, documenting signals from almost 9,000 antennas, catching more than 150 likely IMSI-catchers.</p>
<p>One of FADe’s local partners, a digital security specialist from Nicaragua, says he was familiar with FADe in 2018 when he read the bombshell reports about Guatemalan surveillance. “The media found the police were using an IMSI-catcher,” he says. “We have known about methods like this in Central America, but we never had the evidence. I said, ‘We need to monitor that. I need to bring this to Nicaragua.&#8217;”</p>
<h2 class="wp-block-heading"><strong>Some of the Findings</strong></h2>
<p>The results in Nicaragua revealed <a href="https://fadeproject.org/?project=managua-2g-2" target="_blank" rel="noreferrer noopener">23 antennas around Managua</a> with anomalies that indicated the presence of an IMSI catcher. The local partner (who is remaining anonymous for security reasons) says the findings informed a wider discussion in Nicaragua about telephone eavesdropping. Although it was common knowledge that the government had an “open door” from the national ISP to eavesdrop online, the FADe data drove new public scrutiny and <a href="https://confidencial.digital/english/39-fake-antennas-discovered-monitoring-cell-phones-in-nicaragua/" target="_blank" rel="noreferrer noopener">media coverage</a> about the use of fake antennas.</p>
<p>Among the other FADe sites, <a href="https://www.reuters.com/article/us-mexico-tech-rights-trfn-analysis/birds-on-the-wire-concerns-over-mexico-cell-phone-surveillance-idUSKBN23J2CC/" target="_blank" rel="noreferrer noopener">Mexico</a> and <a href="https://openinternet.global/news/reality-digital-authoritarianism-venezuela" target="_blank" rel="noreferrer noopener">Venezuela</a> recorded an especially high number of fake antennas, as experts from <a href="https://poderlatam.org/" target="_blank" rel="noreferrer noopener">PODER</a> recounted <a href="https://www.washingtonpost.com/es/post-opinion/2020/05/31/datos-y-llamadas-de-celulares-en-riesgo-de-espionaje-por-antenas-falsas-en-america-latina/" target="_blank" rel="noreferrer noopener">in the Washington Post</a> (ES). Data from Caracas, Venezuela, showed <a href="https://fadeproject.org/?project=caracas" target="_blank" rel="noreferrer noopener">33 different devices</a> with irregular readings that could indicate IMSI-catchers. In Buenos Aires, Argentina, out of 1,000 cell towers monitored, <a href="https://fadeproject.org/?project=buenos-aires-2g&amp;lang=es" target="_blank" rel="noreferrer noopener">suspicious patterns</a> were found in 17 antennas, with most concentrated around the downtown and university areas. Notably, the suspicious antennas found in Buenos Aires were all on the 2G network, with no irregularities seen in the <a href="https://fadeproject.org/?project=buenos-aires-4g" target="_blank" rel="noreferrer noopener">smaller group</a> of devices on the 4G network, which is known to be harder to surveil. For summaries of the observations in all locations, see the project’s <a href="https://fadeproject.org/?page_id=38" target="_blank" rel="noreferrer noopener">results section</a>.  <a href="https://www.opentech.fund/news/how-to-catch-an-imsi-catcher/" target="_blank" rel="noopener">source</a></p>
</div>
</div>
</div>
<blockquote class="wp-embedded-content" data-secret="CwUzk2Zogw"><p><a href="https://goodshepherdmedia.net/cell-site-simulators-imsi-catchers-aka-stingray-phone-tracker/">Cell-site simulators/ imsi catchers aka Stingray phone tracker</a></p></blockquote>
<p><iframe class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;Cell-site simulators/ imsi catchers aka Stingray phone tracker&#8221; &#8212; Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content" src="https://goodshepherdmedia.net/cell-site-simulators-imsi-catchers-aka-stingray-phone-tracker/embed/#?secret=QHM7OzueSq#?secret=CwUzk2Zogw" data-secret="CwUzk2Zogw" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><iframe title="Pacamarra: IMSI catcher intercepts calls, not personal data | Morning Matters" width="640" height="360" src="https://www.youtube.com/embed/fTCnf6mAgxk?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><iframe title="RayHunter - Building the EFFs IMSI Catcher Detector" width="640" height="360" src="https://www.youtube.com/embed/SbSYSNuAetI?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><iframe title="NDSS 2025 - Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic" width="640" height="360" src="https://www.youtube.com/embed/jY3idyn11Tc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><iframe title="DICT: IMSI catchers may operate in public spaces, tracking, intercepting mobile communications | ANC" width="640" height="360" src="https://www.youtube.com/embed/iUIcCMG30ZY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cell-site simulators/ imsi catchers aka Stingray phone tracker</title>
		<link>https://goodshepherdmedia.net/cell-site-simulators-imsi-catchers-aka-stingray-phone-tracker/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Sun, 24 Aug 2025 21:49:24 +0000</pubDate>
				<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Phone Hacks]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[📱Mobile📱]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[Cell-site simulators]]></category>
		<category><![CDATA[Cell-site simulators/ imsi catchers]]></category>
		<category><![CDATA[imsi catchers]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21346</guid>

					<description><![CDATA[Cell-site simulators/ imsi catchers aka Stingray phone tracker Cell-site simulators/ imsi catchers Cell-site simulators, also known as Stingrays or IMSI catchers, are devices that masquerade as legitimate cell-phone towers, tricking phones within a certain radius into connecting to the device rather than a tower. Cell-site simulators operate by conducting a general search of all cell phones within [&#8230;]]]></description>
										<content:encoded><![CDATA[<h2>Cell-site simulators/ imsi catchers aka <span class="mw-page-title-main">Stingray phone tracker</span></h2>
<p><iframe title="5G IMSI Catchers Mirage5G IMSI Catchers Mirage" width="640" height="360" src="https://www.youtube.com/embed/Bg1HVaw1Sm4?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Cell-site simulators/ imsi catchers</h2>
<div dir="ltr">
<div class="content">
<p>Cell-site simulators, also known as Stingrays or IMSI catchers, are devices that<a href="https://www.eff.org/deeplinks/2015/01/2014-review-stingrays-go-mainstream"> masquerade as legitimate cell-phone towers</a>, tricking phones within a certain radius into<a href="https://www.justice.gov/opa/file/767321/download"> connecting to the device rather than a tower</a>.</p>
<p>Cell-site simulators operate by conducting a general search of all cell phones within the device’s radius, in violation of basic constitutional protections.  Law enforcement use cell-site simulators to pinpoint the location of phones with greater accuracy than phone companies and without needing to involve the phone company at all. Cell-site simulators can also log IMSI numbers, (International Mobile Subscriber Identifiers) unique to each SIM card, of all of the mobile devices within a given area. Some cell-site simulators may have advanced features allowing law enforcement to intercept communications.</p>
</div>
</div>
<p><iframe title="This $50 Device lets anyone spy and track your phone!" width="640" height="360" src="https://www.youtube.com/embed/PpkLts5fdII?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<div dir="ltr">
<div class="content">
<h3><span style="color: #008080;"><a href="https://www.opentech.fund/news/how-to-catch-an-imsi-catcher/" target="_blank" rel="noopener"><span style="color: #0000ff;">DOWNLOAD</span></a> IMSI CATHER SOFTWARE AND BUILD YOUR OWN!</span><span style="color: #ff0000;"> TO OF COURSE SOLVE SECURITY FLAWS IN YOUR OWN SYSTEM ONLY </span></h3>
<h3>How Cell-Site Simulators Work</h3>
<h4>Standard Communication</h4>
<p>Cellular networks are distributed over geographic areas called &#8220;cells.&#8221; Each cell is served by one transceiver, also known as a cell-site or base station. Your phone naturally connects with the closest base station to provide you service as you move through various cells.</p>
<figure class="image"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21348" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/content_CSS-2.png" alt="" width="700" height="373" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/content_CSS-2.png 700w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/content_CSS-2-400x213.png 400w" sizes="(max-width: 700px) 100vw, 700px" /><figcaption>
<div class="image-attribution">Source: EFF</div>
<div class="image-caption"></div>
</figcaption></figure>
<p>&nbsp;</p>
<p>Generally, there are two types of device used by law enforcement that are often referred to interchangeably: passive devices (which we will call IMSI catchers), and active devices (which we will call cell-site simulators.) Passive devices, as a rule, do not transmit any signals. They work by plucking cellular transmissions out of the air, the same way an FM radio works. They then decode (and sometimes decrypt) those signals to find the IMSI of the mobile device and track it.</p>
<p>Active cell-site simulators are much more commonly used by law enforcement, and work very differently from their passive cousins. Cellular devices are designed to connect to the cell site nearby with the strongest signal. To exploit this, cell-site simulators broadcast signals that are either stronger than the legitimate cell sites around them, or are made to appear stronger. This causes devices within range to disconnect from their service providers’ legitimate cell sites and to instead establish a new connection with the cell-site simulator. Cell-site simulators can also take advantage of flaws in the design of cellular protocols (such as 2G/3G/4G/5G) to cause phones to disconnect from a legitimate cell-site and connect to the cell-site simulator instead.  For the purposes of this article we will focus on active cell-site simulators.</p>
<p>It is difficult for most people to know whether or not their phone’s signals have been accessed by an active cell-site simulator, and it is impossible for anyone to know if their phone’s signals have been accessed by a passive IMSI catcher. Apps for identifying the use of cell-site simulators, such as SnoopSnitch, may not be verifiably accurate. Some more advanced tools have been built, which may be more accurate. For instance, security researchers at the University of Washington have<a href="https://seaglass.cs.washington.edu/"> designed a system to measure the use of cell-site simulators across Seattle</a>, and EFF researchers <a href="https://github.com/EFForg/crocodilehunter/">have designed a similar system</a>.</p>
<h3>What Kinds of Data Cell-Site Simulators Collect</h3>
<p>Data collected by cell-site simulators can reveal intensely personal information about anyone who carries a phone, whether or not they have ever been suspected of a crime.</p>
<figure class="image"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21349" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/content_CSS-3.png" alt="" width="700" height="438" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/content_CSS-3.png 700w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/content_CSS-3-400x250.png 400w" sizes="(max-width: 700px) 100vw, 700px" /><figcaption>
<div class="image-attribution">Source: EFF</div>
<div class="image-caption">Cell-site simulator surveillance: Cell-site simulators trick your phone into thinking they are base stations.</div>
</figcaption></figure>
<p>&nbsp;</p>
<p>Once your cellular device has connected to a cell-site simulator, the cell-site simulator can determine your location and trigger your device to transmit its  IMSI for later identification. If the cell-site simulator is able to downgrade the cellular connection to a 2G/GSM connection then it can potentially perform much more intrusive acts such as intercepting call metadata (what numbers were called or called the phone and the amount of time on each call),<a href="https://www.justice.gov/sites/default/files/criminal/legacy/2014/10/29/elec-sur-manual.pdf"> the content of unencrypted phone calls and text messages</a> and some types of data usage (such as websites visited).  Additionally, marketing materials produced by the manufacturers of cell-site simulators indicate that they<a href="https://info.publicintelligence.net/Gamma-GSM.pdf"> can be configured</a> to divert calls and text messages, edit messages, and even spoof the identity of a caller in text messages and calls on a 2G/GSM network.</p>
<h3>How Law Enforcement Uses Cell-Site Simulators</h3>
<p>Police can use cell-site simulators to try to locate a person when they already know their phone’s identifying information, or to gather the IMSI (and later the identity) of anyone in a specific area. Some cell-site simulators are small enough to fit in a police cruiser, or even on the vest of an officer, allowing law enforcement officers to drive to multiple locations, capturing from every mobile device in a given area—in some cases<a href="https://theintercept.com/2015/12/17/a-secret-catalogue-of-government-gear-for-spying-on-your-cellphone/"> up to 10,000 phones</a> at a time. These indiscriminate, dragnet searches include phones located in traditionally protected private spaces, such as homes and doctors’ offices.</p>
<p>Law enforcement officers have used information from cell-site simulators to investigate major and minor crimes and civil offenses.<a href="https://www.usatoday.com/story/news/2015/08/23/baltimore-police-stingray-cell-surveillance/31994181/"> Baltimore Police, for example,</a> have used their devices for a wide variety of purposes, ranging from tracking a kidnapper to trying to locate a man who took his wife’s phone during an argument (and later returned it to her).<a href="https://gizmodo.com/maryland-police-used-an-indiscriminate-cellphone-spy-to-1774831661"> In one case</a>, Annapolis Police used a cell-site simulator to investigate a robbery involving $56 worth of submarine sandwiches and chicken wings. In Detroit,<a href="https://www.eff.org/deeplinks/2017/05/no-hunting-undocumented-immigrants-stingrays"> U.S. Immigration and Customs Enforcement used a cell-site simulator</a> to locate and arrest an undocumented immigrant. In California, the San Bernardino county sheriff&#8217;s office <a href="https://arstechnica.com/tech-policy/2018/10/eff-sues-county-sheriff-claims-agency-wont-give-up-stingray-related-records/">used their cell-site simulator over 300 times in a little over a year</a>.</p>
<p>Police may have deployed cell-site simulators at protests. The Miami-Dade Police Department apparently<a href="http://cdn.arstechnica.net/wp-content/uploads/2013/09/miami-dade.pdf"> first purchased a cell-site simulator in 2003 to surveil protestors at a Free Trade of the Americas Agreement conference</a>. And it is suspected that they have been used <a href="https://www.law.georgetown.edu/american-criminal-law-review/wp-content/uploads/sites/15/2022/02/59-1-Owsley-George_Floyd_General_Warrants.pdf">more recently than that </a>during protests against police violence in 2020.</p>
<p>Cell-site simulators<a href="http://www.vocativ.com/389656/stingray-devices-in-trumps-america/"> are used</a> by the FBI, DEA, NSA, Secret Service, and ICE, as well as the U.S. Army, Navy, Marine Corps, and National Guard. U.S. Marshals and the FBI <a href="https://www.wsj.com/articles/americans-cellphones-targeted-in-secret-u-s-spy-program-1415917533">have attached cell-site simulators to airplanes</a> to track suspects, gathering massive amounts of data about many innocent people in the process. The<a href="https://www.texasobserver.org/texas-national-guard-spying-devices-surveillance/"> Texas Observer</a> also uncovered airborne cell-site simulators in use by the Texas National Guard. In 2023 it was revealed that ICE, DHS, and the Secret Service have all <a href="https://www.eff.org/deeplinks/2023/03/report-ice-and-secret-service-conducted-illegal-surveillance-cell-phones">used cell-site simulators many times without following their own rules on deployment or getting a warrant</a>.</p>
<p>A<a href="https://www.eff.org/deeplinks/2017/02/bipartisan-congressional-oversight-committee-wants-probable-cause-warrants-0"> recent Congressional Oversight Committee report</a> called on Congress to pass laws requiring a warrant before using cell-site simulators. Some states,<a href="https://www.eff.org/cases/californias-electronic-communications-privacy-act-calecpa"> such as California</a>, already require a warrant, except in emergency situations.</p>
<h3>Who Sells Cell-site Simulators</h3>
<p>Harris Corporation is the most well known company providing cell-site simulators to law enforcement. Their Stingray product has become the catchphrase for these devices, but they have subsequently introduced other models, such as Hailstorm,<a href="https://www.documentcloud.org/documents/3105805-Arrowhead-1-0-1-Release-Notes.html"> ArrowHead</a>,<a href="https://www.documentcloud.org/documents/3105793-Gemini-3-3-Quick-Start-Guide.html"> AmberJack, and KingFish</a>. Harris has stopped selling cell-site simulator technology to local law enforcement agencies but still works with the federal government. Digital Receiver Technology, a division of Boeing, is also a common supplier of the technology, often referred to as “<a href="https://www.revealnews.org/article/chicago-and-los-angeles-have-used-dirt-box-surveillance-for-a-decade/">dirtboxes</a>.”</p>
<p>Other sellers of cell-site simulators include Keyw, Octastic, Tactical Support Equipment, Berkeley Varitronics, Cogynte, X-Surveillance, Atos, Rayzone, Martone Radio Technology, Septier Communication, PKI Electronic Intelligence, Datong (Seven Technologies Group), Ability Computers and Software Industries, Gamma Group, Rohde &amp; Schwarz, Meganet Corporation. Manufacturers<a href="http://www.septier.com/law-enforcement/"> Septier</a> and<a href="https://info.publicintelligence.net/Gamma-GSM.pdf"> Gamma GSM</a> both provide information on what the devices can capture. The Intercept published a<a href="https://theintercept.com/2015/12/17/a-secret-catalogue-of-government-gear-for-spying-on-your-cellphone/"> secret, internal U.S. government catalogue</a> of various cellphone surveillance devices, as well as an<a href="https://theintercept.com/2016/09/12/long-secret-stingray-manuals-detail-how-police-can-spy-on-phones/"> older cell-site simulator manual</a> made available through a Freedom of Information Act request.</p>
<h3>Threats Posed by Cell-Site Simulators</h3>
<p>Cell-site simulators invade the privacy of everyone who happens to be in a given area, regardless of the fact that the vast majority have not been accused of committing a crime. These are <a href="https://www.hoover.org/sites/default/files/research/docs/lynch_webreadypdf.pdf">general searches</a> that violate the Fourth Amendment requirement that warrants “particularly” describe who or what is to be searched.</p>
<p>The use of cell-site simulators have been shrouded in government secrecy. Police have used cell-site simulators to track location data without a warrant, by deceptively obtaining “pen register” orders from courts without explaining the true nature of the surveillance. In Baltimore, a judge concluded that law enforcement had <a href="https://www.aclu.org/other/state-v-andrews-stingray-june-4-2015-transcript?redirect=state-v-andrews-stingray-june-4-2015-transcript">intentionally withheld the information</a> from the defense, in violation of their legal disclosure obligations. For a while, police departments tried to keep the use of cell-site simulators secret from not just the public but also the court system, withholding information from defense attorneys and judges—likely due in part to<a href="http://www.baltimoresun.com/news/maryland/baltimore-city/bs-md-ci-stingray-case-20150408-story.html"> non-disclosure agreements</a> with Harris Corporation. Prosecutors have<a href="https://www.washingtonpost.com/world/national-security/secrecy-around-police-surveillance-equipment-proves-a-cases-undoing/2015/02/22/ce72308a-b7ac-11e4-aa05-1ce812b3fdd2_story.html"> accepted plea deals</a> to hide their use of cell-site simulators and have even<a href="http://arstechnica.com/tech-policy/2015/04/fbi-would-rather-prosecutors-drop-cases-than-disclose-stingray-details/"> dropped cases</a> rather than revealing information about their use of the technology. U.S. Marshalls have<a href="https://arstechnica.com/tech-policy/2014/06/us-marshals-step-in-thwart-efforts-to-learn-about-cell-tracking-devices/"> driven files hundreds of miles</a> to thwart public records requests. Police have <a href="https://www.eff.org/deeplinks/2015/01/2014-review-stingrays-go-mainstream">tried to keep information secret</a> in Sarasota, Florida, Tacoma, Washington,<a href="https://arstechnica.com/tech-policy/2014/11/prosecutors-drop-key-evidence-at-trial-to-avoid-explaining-stingray-use/"> Baltimore, Maryland</a>, and St. Louis, Missouri.</p>
<p>To preserve this secrecy, the<a href="https://theintercept.com/2016/05/05/fbi-told-cops-to-recreate-evidence-from-secret-cell-phone-trackers/"> FBI told police officers to recreate evidence</a> from the devices, according to a document obtained by the nonprofit investigative journalism outlet Oklahoma Watch.</p>
<p>Cell-site simulators often disrupt cell phone communications within as much as a<a href="http://www.theglobeandmail.com/news/national/rcmp-listening-tool-capable-of-knocking-out-911-calls-memoreveals/article29672075/"> 500-meter radius</a> of the device, interrupting important communications and even <a href="http://www.theglobeandmail.com/news/national/rcmp-listening-tool-capable-of-knocking-out-911-calls-memoreveals/article29672075/">emergency phone calls</a>.  Cell-site simulators have been shown to disproportionately affect low-income communities and communities of color. In Baltimore, the use of cell-site simulators disproportionately impacted African-American communities, according to a map included in an <a href="https://www.eff.org/deeplinks/2016/08/civil-liberties-groups-file-fcc-complaint-arguing-baltimore-police-are-illegally">FCC complaint</a> that overlaid where Baltimore Police were using stingrays over census data on the city’s black population.</p>
<p><a href="https://www.eff.org/deeplinks/2018/08/blog-post-wyden-911-disruption-css">Cell-site simulators can also disrupt emergency calls</a>, such as 911 in the US, making them not only a menace to privacy but to public safety as well.</p>
<p>Cell-site simulators rely on vulnerabilities in our communications system that the government should help fix rather than exploit.</p>
<h3>EFF’s Work on Cell-Site Simulators</h3>
<p>For the reasons above, EFF opposes police use of cell site simulators. Insofar as law enforcement agencies are using cell-site simulators in criminal investigations, EFF argues that use should be limited in the following ways:</p>
<ol>
<li>Law enforcement should obtain individualized warrants based on probable cause;</li>
<li>Cell-site simulators should only be used for serious, violent crimes;</li>
<li>Cell-site simulators should only be used for identifying location of a particular phone;</li>
<li>Law enforcement must minimize the collection of data from people who are not the targets of the investigation.</li>
<li>Companies making cell-site simulators must confirm that their technology does not disrupt calls to emergency services.</li>
</ol>
<h4>Litigation</h4>
<p>We <a href="https://www.eff.org/press/releases/eff-files-foia-suit-over-us-marshals-spy-planes">filed a Freedom of Information Act lawsuit</a> to expose and shine light on the U.S. Marshals Service’s use of cell-site simulators on planes.</p>
<p>Along with the ACLU and ACLU of Maryland, we <a href="https://www.eff.org/deeplinks/2015/12/eff-joins-aclu-amicus-brief-supporting-warrant-requirement-cell-site-simulators">filed an amicus brief</a> in the first case in the country where a judge threw out evidence obtained as a result of using a cell-site simulator without a warrant.</p>
<p>We filed an amicus brief, along with the ACLU, pointing a court to facts indicating that the Milwaukee Police Department secretly used a cell-site simulator to locate a defendant through his cell phone without a warrant in U.S. vs. Damian Patrick. (The government then <a href="https://www.eff.org/document/us-v-patrick-government-letter-admitting-stingray-use">admitted</a> to having used it.)</p>
<h4>Legislation</h4>
<p>We were original co-sponsors of the <a href="https://www.eff.org/cases/californias-electronic-communications-privacy-act-calecpa">California Electronic Communications Privacy Act (CalECPA)</a>, along with the ACLU and the California Newspaper Publisher Association. This law requires California police to get a warrant before using a cell-site simulator. Any evidence obtained from a cell-site simulator without a warrant is inadmissible in court.</p>
<p>EFF supported S.B. 741, which requires transparency measures regarding the use of cell-site simulators. We <a href="https://www.eff.org/deeplinks/2016/04/here-are-79-policies-california-surveillance-tech-where-are-other-90">collected many of these policies</a>.</p>
<h4>Further Research</h4>
<p>We have written a report on the <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks">technical means possibly used by cell-site simulators called “Gotta Catch ‘em All”</a>, and we have developed a proof of concept technical means of <a href="https://github.com/EFForg/crocodilehunter">detecting cell-site simulators called Crocodile Hunter</a>.</p>
<h3>EFF Cases</h3>
<p><a href="https://www.eff.org/cases/state-maryland-v-kerron-andrews">State of Maryland v. Kerron Andrews</a></p>
<p><a href="https://www.eff.org/cases/us-v-damian-patrick">U.S. v. Damian Patrick</a></p>
<p><a href="https://www.eff.org/cases/us-marshals-airborne-imsi-catchers">EFF v. U.S. Department of Justice</a></p>
<h3><strong>Suggested Additional Reading</strong></h3>
<p><a href="https://www.aclu.org/issues/privacy-technology/surveillance-technologies/stingray-tracking-devices-whos-got-them">Stingray Tracking Devices: Who&#8217;s Got Them?</a> (ACLU)</p>
<p><a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2437678">Your Secret Stingray&#8217;s No Secret Anymore: The Vanishing Government Monopoly over Cell Phone Surveillance and Its Impact on National Security and Consumer Privacy</a> (Harvard Journal of Law and Technology)</p>
<p><a href="https://oversight.house.gov/hearing/examining-law-enforcement-use-of-cell-phone-tracking-devices/">Examining Law Enforcement Use of Cell Phone Tracking Devices</a> (House Oversight Committee)</p>
<p><a href="http://centerformediajustice.org/resources/the-relentless-eye/">The Relentless “Eye” Local Surveillance: Its Impact on Human Rights and Its Relationship to National and International Surveillance</a> (Center for Media Justice and others)</p>
<p><a href="https://www.justice.gov/opa/file/767321/download">Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology</a> (U.S. Department of Justice)</p>
<p><a href="https://theintercept.com/2016/09/12/long-secret-stingray-manuals-detail-how-police-can-spy-on-phones/">Long-Secret Stingray Manuals Detail How Police Can Spy on Phones</a>  (The Intercept)</p>
<p><a href="https://theintercept.com/2015/12/17/a-secret-catalogue-of-government-gear-for-spying-on-your-cellphone/">A Secret Catalogue of Government Gear for Spying on Your Cellphone</a> (The Intercept)</p>
<p><a href="https://gizmodo.com/american-cops-turns-to-canadian-phone-tracking-firm-aft-1845442778">Cops Turn to Canadian Phone-Tracking Firm After Infamous &#8216;Stingrays&#8217; Become &#8216;Obsolete&#8217;</a> (Gizmodo)</p>
</div>
</div>
<p><a href="https://sls.eff.org/technologies/cell-site-simulators-imsi-catchers" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
<hr />
<div id="tm-row-687d638d57d7d" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d58012" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-heading-687d638d582dd" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">IMSI Catcher System</h4>
</div>
<div id="tm-spacer-687d638d58705" class="tm-spacer"></div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<p>Cellular Interception Solutions help law enforcement authorities to acquire, intercept, analyze and manage cellular communications such as voice, SMS, and Call Related Information (CRI) data. This becomes vital as terrorists and criminal elements rely upon cellular mobile communications to carry out their subversive operations.</p>
<p>The initial step in the interception of any phone is identifying the presence of target phones in the areas of interest. This can be achieved using IMSI-Catcher. IMSI Catcher Systems are designed to collect basic identities (IMSI, IMEI) of 2G, 3G, and 4G mobile phones working within their coverage area without the knowledge of the service providers and the phone users. This enables the agencies to identify the presence of the target in their area of operation. These phones can then be intercepted by Passive, Semi-Active, or Hybrid Interception systems.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5895d" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d58b4f" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-spacer-687d638d58d40" class="tm-spacer"></div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d58e24" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d590a0" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="imsi_contact" class="tm-button-wrapper tm-animation move-up animate"><a class="tm-button style-flat tm-button-nm tm-button- has-icon icon-right" href="https://www.stratign.com/gsm-interception-system-v2/"><span class="button-text" data-text="Contact">Contact </span><i class="fa fa-phone-square"></i></a></div>
<div id="tm-spacer-687d638d59451" class="tm-spacer"></div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d59563" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5977f" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-heading-687d638d599fb" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">Passive GSM Interception System</h4>
</div>
<div id="tm-spacer-687d638d59e54" class="tm-spacer"></div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<p>Passive GSM Interception System is the most advanced monitoring system that does not transmit any information, hence making it completely undetectable by the operator or by the target that is being intercepted.</p>
</div>
</div>
<div id="tm-spacer-687d638d59f14" class="tm-spacer"></div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d59fdc" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5a1c4" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div class="wpb_raw_code wpb_content_element wpb_raw_html">
<div class="wpb_wrapper"><img loading="lazy" decoding="async" class="alignnone wp-image-21350" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-scaled.png" alt="" width="715" height="455" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-scaled.png 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-400x255.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-1024x652.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-768x489.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-1536x978.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-2048x1304.png 2048w" sizes="(max-width: 715px) 100vw, 715px" /></div>
</div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5a4d5" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5a6dc" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-heading-687d638d5a934" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">Features</h4>
</div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<ul>
<li>System is completely passive, and its presence cannot be detected either by the target or by the service provider.</li>
<li>Capable of intercepting 2G, 3G, 4G and 5G networks.</li>
<li>Capable of intercepting calls and messages.</li>
<li>Location of targets can be displayed on a digital map</li>
<li>Capable of intercepting 4 to 32 at a time from across multiple service providers.</li>
<li>Real-time passive deciphering of A5/1, A5/2, and A5/0 encrypted signals.</li>
<li>System stores intercepted voice calls, SMS, and protocol information on the control PC hard drive.</li>
<li>Addition configuration of Open-Source Intelligence (OSINT), Voice Print Analysis, Link analysis.</li>
</ul>
</div>
</div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5af4e" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5b1de" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-spacer-687d638d5b36c" class="tm-spacer"></div>
<div id="tm-heading-687d638d5b46a" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">Semi-Active GSM Interception System</h4>
</div>
<div id="tm-spacer-687d638d5b8ad" class="tm-spacer"></div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<p>Semi-Active GSM Interception System can intercept incoming and outgoing communications between the Base Station, and the Mobile Handset using the principle of Man-in-the-Middle, without being detectable by the operator or by the target that is being intercepted.</p>
</div>
</div>
<div id="tm-spacer-687d638d5b96f" class="tm-spacer"></div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5ba45" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5bc44" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div class="wpb_raw_code wpb_content_element wpb_raw_html">
<div class="wpb_wrapper"><img loading="lazy" decoding="async" class="alignnone wp-image-21351" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-scaled.png" alt="" width="865" height="551" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-scaled.png 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-400x255.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-1024x652.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-768x489.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-1536x978.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-2048x1305.png 2048w" sizes="(max-width: 865px) 100vw, 865px" /></div>
</div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5beb6" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5c149" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-heading-687d638d5c3d3" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">Features</h4>
</div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<ul>
<li>Interception does not require the service provider’s assistance or SIM for operation.</li>
<li>Real-time listening of the intercepted cell phone calls.</li>
<li>Capable of intercepting 2G, 3G, 4G and 5G networks.</li>
<li>Real-time deciphering of A5/1, A5/2, and A5/0 encrypted signals.</li>
<li>Capable of intercepting voice, SMS, and Call Related Information (CRI) data.</li>
<li>Location of targets can be determined with an accuracy for up to 5 meters.</li>
<li>Handheld direction finder for better location accuracy</li>
<li>Selective jamming capability using which the operator can disable certain services of the target like outgoing call, incoming call, SMS, etc.</li>
<li>Spoofing and manipulating Text Messages and Calls.</li>
<li>Capable of intercepting 4 to 32 at a time from across multiple service providers.</li>
<li>Addition configuration of Open-Source Intelligence (OSINT), Voice Forensics, Keyword Spotting.</li>
</ul>
</div>
</div>
<div id="tm-spacer-687d638d5c8bb" class="tm-spacer"></div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5c9a5" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5cbf8" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-spacer-687d638d5cd57" class="tm-spacer"></div>
<div id="tm-heading-687d638d5cdf7" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">Hybrid GSM Interception System</h4>
</div>
<div id="tm-spacer-687d638d5d1f8" class="tm-spacer"></div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<p>Hybrid GSM Interception system is a combination of Passive and Semi-Active interception systems. The basic functioning of the system is like the passive system and is turned into an active one only when required.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5d378" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5d593" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div class="wpb_raw_code wpb_content_element wpb_raw_html">
<div class="wpb_wrapper"><img loading="lazy" decoding="async" class="alignnone wp-image-21352" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-scaled.png" alt="" width="774" height="493" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-scaled.png 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-400x255.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-1024x652.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-768x489.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-1536x978.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-2048x1305.png 2048w" sizes="(max-width: 774px) 100vw, 774px" /></div>
</div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5d82b" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5d9eb" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-heading-687d638d5dbb8" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">Features</h4>
</div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<ul>
<li>In Passive Mode all features of the passive system will apply.</li>
<li>In Semi-Active Mode all features of the Semi-Active Mode system will apply. <a href="https://www.stratign.com/gsm-interception-system-v2/" target="_blank" rel="noopener">source</a></li>
</ul>
</div>
</div>
</div>
</div>
</div>
</div>
<hr />
<h1 class="entry-title">Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic</h1>
<p><strong>Tyler Tucker (University of Florida), Nathaniel Bennett (University of Florida), Martin Kotuliak (ETH Zurich), Simon Erni (ETH Zurich), Srdjan Capkun (ETH Zuerich), Kevin Butler (University of Florida), Patrick Traynor (University of Florida)</strong></p>
<p>&nbsp;</p>
<p>IMSI-Catchers allow parties other than cellular network providers to covertly track mobile device users. While the research community has developed many tools to combat this problem, current solutions focus on correlated behavior and are therefore subject to substantial false classifications. In this paper, we present a standards-driven methodology that focuses on the messages an IMSI-Catcher textit{must} use to cause mobile devices to provide their permanent identifiers. That is, our approach focuses on causal attributes rather than correlated ones. We systematically analyze message flows that would lead to IMSI exposure (most of which have not been previously considered in the research community), and identify 53 messages an IMSI-Catcher can use for its attack. We then perform a measurement study on two continents to characterize the ratio in which connections use these messages in normal operations. We use these benchmarks to compare against open-source IMSI-Catcher implementations and then observe anomalous behavior at a large-scale event with significant media attention. Our analysis strongly implies the presence of an IMSI-Catcher at said public event ($p &lt;&lt; 0.005$), thus representing the first publication to provide evidence of the statistical significance of its findings. <a href="https://www.ndss-symposium.org/ndss-paper/detecting-imsi-catchers-by-characterizing-identity-exposing-messages-in-cellular-traffic/" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
<blockquote class="wp-embedded-content" data-secret="148xCekYPH"><p><a href="https://goodshepherdmedia.net/detecting-imsi-catchers-tools-apps-and-methods-you-should-know/">Detecting IMSI Catchers: Tools, Apps and Methods You Should Know</a></p></blockquote>
<p><iframe class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;Detecting IMSI Catchers: Tools, Apps and Methods You Should Know&#8221; &#8212; Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content" src="https://goodshepherdmedia.net/detecting-imsi-catchers-tools-apps-and-methods-you-should-know/embed/#?secret=adQrYGaIcF#?secret=148xCekYPH" data-secret="148xCekYPH" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Laika the dog first entered orbit in 1957</title>
		<link>https://goodshepherdmedia.net/laika-the-dog-first-entered-orbit-in-1957/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Sat, 26 Jul 2025 02:21:27 +0000</pubDate>
				<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[Russia 🇷🇺]]></category>
		<category><![CDATA[Science & Engineering]]></category>
		<category><![CDATA[Space Travel]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Tragic]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🌍World Stage🌍]]></category>
		<category><![CDATA[🙂Fun Facts🙂]]></category>
		<category><![CDATA[first animal in space]]></category>
		<category><![CDATA[First being into space]]></category>
		<category><![CDATA[Laika the dog]]></category>
		<category><![CDATA[Laika the dog first entered orbit in 1957]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21386</guid>

					<description><![CDATA[Laika the dog first entered orbit in 1957 Laika was a Soviet space dog, and the first animal to orbit Earth. Launched on November 3, 1957, aboard Sputnik 2, her mission aimed to test the feasibility of sending a living organism into space and gather data on space travel&#8217;s effects. While she successfully reached orbit, the technology to return her [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>Laika the dog first entered orbit in 1957</h1>
<p><span class="oXzekf" data-huuid="7865316192817145862">Laika was <mark class="QVRyCf">a Soviet space dog, and the first animal to orbit Earth</mark>. </span><span class="oXzekf" data-huuid="7865316192817144941">Launched on November 3, 1957, aboard <span class="M5tQyf">Sputnik 2,</span> her mission aimed to test the feasibility of sending a living organism into space and gather data on space travel&#8217;s effects. </span><span class="oXzekf" data-huuid="7865316192817144020">While she successfully reached orbit, the technology to return her to Earth safely did not exist at the time, and she perished during the flight.<span class="pjBG2e" data-cid="1b103c84-63b3-4bc0-a84c-167a978c8f14"><span class="UV3uM"> </span></span></span></p>
<div class="zMgcWd dSKvsb" data-il="">
<div data-crb-p="">
<div class="xFTqob">
<ul>
<li class="vM0jzc"><span data-huuid="7865316192817146177">Laika was a stray dog from the streets of Moscow. </span><span data-huuid="7865316192817145256">Her real name was <span class="M5tQyf">Kudryavka,</span> meaning &#8220;Little Curly&#8221;. </span><span data-huuid="7865316192817144335">She was nicknamed &#8220;Laika,&#8221; which is Russian for &#8220;barker&#8221; or &#8220;husky&#8221;. </span><span data-huuid="7865316192817147510">In the U.S., she was also referred to as &#8220;Muttnik&#8221;. </span></li>
<li class="vM0jzc"><strong>Mission: </strong>Sputnik 2 was launched as a part of the Soviet Union&#8217;s Vostok program. <span data-huuid="7865316192817143826">The mission&#8217;s primary objective was to study the effects of space travel on a living organism, specifically how a living being would react to the launch, orbital flight, and conditions in space.<span class="pjBG2e" data-cid="88f93476-23cc-4668-a9f9-9b00384047e4"><span class="UV3uM"> </span></span></span></li>
<li><strong>Fate: </strong>Laika did not survive the mission. <span data-huuid="7865316192817144238">Initially, it was reported that she died of oxygen depletion after several days in orbit. </span><span data-huuid="7865316192817147413">However, Russian scientists later revealed that she likely died of overheating and panic hours into the flight. </span><span data-huuid="7865316192817146492">Her remains were destroyed when Sputnik 2 re-entered the Earth&#8217;s atmosphere. </span></li>
<li><strong>Legacy: </strong>Despite the tragic outcome, Laika&#8217;s mission provided valuable data and paved the way for future human spaceflight. <span data-huuid="7865316192817146904">She remains a symbol of the sacrifices made in the pursuit of space exploration.<span class="pjBG2e" data-cid="a5c5599a-4d09-4623-be9a-ac1bb4813e9f"><span class="UV3uM"> </span></span></span></li>
</ul>
</div>
</div>
</div>
<blockquote>
<h2 class="article-header_heading__7ivKD"><em><span style="color: #ff0000;">Tragic final moments on Earth of first space dog Laika &#8216;knowing she&#8217;d never come back&#8217;</span></em></h2>
</blockquote>
<h2 class="summary_summary__q_VAA">The Soviet Union space dog died afraid and alone, 940km from Earth</h2>
<p class="text_text__nEn66"><strong>The first animal to orbit the Earth had a bittersweet final moment on land before essentially being blasted off to her death.</strong></p>
<p class="text_text__nEn66">Tissues at the ready, because the story of Laika the Soviet space dog is a heartbreaking one.</p>
<p class="text_text__nEn66">While there&#8217;s no doubt that space exploration is an incredible feat, it&#8217;s taken decades of work to get humans safely into orbit.</p>
<div class="floating-video-player_container__u4D9_">
<div data-stn-player="pht7y9mu">
<div class="voltax-mp-placeholder vp-g9uvubq voltax-mp-placeholder-anchored floating" data-is-split-view="false">
<div class="voltax-mp-container-anchored">
<div class="titleBar title-anchor"><span class="title"><span class="">Up Next &#8211; &#8216;Shrinking mill&#8217; footage goes viral</span></span></div>
</div>
</div>
</div>
</div>
<div class="voltax-mp-controls"></div>
<div>
<div class="wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex" data-beyondwords-marker="b534ae91-80dd-48b3-999b-5a86367f05cd">
<blockquote>
<h3 class="wp-block-button" style="text-align: center;" data-beyondwords-marker="b4db4e75-b591-44ce-bb59-73479aa0d93a"><strong><a class="wp-block-button__link wp-element-button" href="https://headlines.peta.org/take-action-end-experiments-dogs/#action" target="_blank" rel="noopener">Take Action for Dogs Used in Experiments CLICK HERE TO HELP THE DOGS!</a></strong></h3>
</blockquote>
</div>
<h2 class="wp-block-heading" data-beyondwords-marker="0890d204-82e1-45b8-a6b1-892eb59ca229"></h2>
</div>
<div></div>
<div></div>
<div>
<p><iframe title="3rd November 1957: Laika the dog becomes the first animal to enter orbit around the Earth" width="640" height="360" src="https://www.youtube.com/embed/6xouInKqvWQ?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
<div></div>
<div></div>
<p class="text_text__nEn66">And in 1957, stray terrier mix Laika was plucked off the streets of Moscow to be sent one a one-way mission that would help inform the future of space travel.</p>
<p class="text_text__nEn66">Gentle in nature, the three-year-old canine &#8211; originally named Kudryavka, meaning little curly &#8211; died alone and terrified, some 940km away from Earth.</p>
<div class="article-image_articleImage__eyzAn">
<div class="article-image_imageWrapper__ANtPE">
<div class="resizable-image_wrapper__LRQlr"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21388" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/resize.webp" alt="" width="750" height="490" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/resize.webp 750w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/resize-400x261.webp 400w" sizes="(max-width: 750px) 100vw, 750px" /></div>
</div>
<p><cite class="image-credit_imageCredit__YMlqS">Tiny Laika was the first animal to orbit Earth (Sovfoto/Universal Images Group via Getty Images)</cite></div>
<p class="text_text__nEn66">But she provided scientists with some of the first data on the biological effects of spaceflight, helping us to better understand what launch and microgravity could<a class="anchor_link__6t7IO" href="https://www.unilad.com/technology/space/what-would-happen-body-space-tech-438628-20241011"> do to a human body.</a></p>
<p class="text_text__nEn66">After months of living in confined spaces and being spun on a centrifuge, Laika was strapped into <a class="anchor_link__6t7IO" href="https://www.unilad.com/russia">Russia&#8217;s</a> Sputnik 2 container for the first and last time.</p>
<p class="text_text__nEn66">In the middle of the day before launch, Laika was placed into its holding container and it was lifted to the top of the rocket around one hour after midnight on November 3, 1957.</p>
<p class="text_text__nEn66">It was a cold night so technicians extended a hose from the ground air-conditioning unit toward the cabin to keep her warm.</p>
<p class="text_text__nEn66">The poor, innocent <a class="anchor_link__6t7IO" href="https://www.unilad.com/animals">animal</a> was absolutely clueless as to what would happen next.</p>
<p class="text_text__nEn66">Engineer Yevgeniy Shabarov recalled the dog&#8217;s final moments on Earth, saying: &#8220;After placing Laika in the container and before closing the hatch, we kissed her nose and wished her bon voyage, knowing that she would not survive the flight.&#8221;</p>
<div class="article-image_articleImage__eyzAn">
<div class="article-image_imageWrapper__ANtPE">
<div class="resizable-image_wrapper__LRQlr"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21389" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/resize-1.webp" alt="" width="750" height="1151" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/resize-1.webp 750w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/resize-1-261x400.webp 261w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/resize-1-667x1024.webp 667w" sizes="(max-width: 750px) 100vw, 750px" /></div>
</div>
<p><cite class="image-credit_imageCredit__YMlqS">Laika was launched into space on Sputnik 2 (Encyclopaedia Britannica/UIG Via Getty Images)</cite></div>
<p class="text_text__nEn66">She was blasted into space and Sputnik successfully reached orbit, becoming the second ever spacecraft to do so.</p>
<p class="text_text__nEn66">Laika made history as the first ever animal to orbit space, but it&#8217;s thought she was only alive for the first five to seven hours of the mission.</p>
<p><iframe title="Sputnik-2 or: Laika, Our Hero" width="640" height="360" src="https://www.youtube.com/embed/77b7965hx8Y?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<div class="wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex" data-beyondwords-marker="b534ae91-80dd-48b3-999b-5a86367f05cd">
<h3 class="wp-block-button" data-beyondwords-marker="b4db4e75-b591-44ce-bb59-73479aa0d93a"><strong><a class="wp-block-button__link wp-element-button" href="https://headlines.peta.org/take-action-end-experiments-dogs/#action" target="_blank" rel="noopener">Take Action for Dogs Used in Experiments CLICK HERE TO HELP THE DOGS!</a></strong></h3>
</div>
<h2 class="wp-block-heading" data-beyondwords-marker="0890d204-82e1-45b8-a6b1-892eb59ca229"></h2>
<p class="text_text__nEn66">The tiny <a class="anchor_link__6t7IO" href="https://www.unilad.com/dogs">dog&#8217;s</a> pulse rate tripled during takeoff and only began to come down during weightlessness.</p>
<p class="text_text__nEn66">The Soviet Union gave conflicting causes of death for years, from her suffocating to battery failure of equipment.</p>
<p class="text_text__nEn66">But in October 2002, one of the <a class="anchor_link__6t7IO" href="https://www.unilad.com/science">scientists</a> behind the Sputnik 2 mission confirmed the real reason.</p>
<p class="text_text__nEn66">Dimitri Malashenkov revealed that Laika had died from overheating and panic by the flight&#8217;s fourth orbit.</p>
<div class="article-image_articleImage__eyzAn">
<div class="article-image_imageWrapper__ANtPE">
<div class="resizable-image_wrapper__LRQlr"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21390" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Laika-the-dog-first-entered-orbit-in-1957-1.webp" alt="" width="750" height="956" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Laika-the-dog-first-entered-orbit-in-1957-1.webp 750w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/Laika-the-dog-first-entered-orbit-in-1957-1-314x400.webp 314w" sizes="(max-width: 750px) 100vw, 750px" /></div>
</div>
<p><cite class="image-credit_imageCredit__YMlqS">Laika died in orbit (Keystone/Getty Images)</cite></div>
<p class="text_text__nEn66">&#8220;It turned out that it was practically impossible to create a reliable temperature control system in such limited time constraints,&#8221; Malashenkov explained in a paper presented to the World Space Congress.</p>
<p class="text_text__nEn66">Scientists knew Laika would have died either way around 10 days in due to lack of oxygen.</p>
<p class="text_text__nEn66">Still, Sputnik 2 marked a major win for the Soviet Union, providing some of the earliest scientific data from above the Earth&#8217;s atmosphere for an extended period. It also moved the country closer to winning the Space Race against the <a class="anchor_link__6t7IO" href="https://www.unilad.com/us-news">US.</a></p>
<p class="text_text__nEn66">After 162 days in orbit, on April 14 1958, Sputnik 2 &#8211; and Laika&#8217;s remains &#8211; disintegrated as it re-entered Earth&#8217;s atmosphere.</p>
<p><cite class="image-credit_imageCredit__YMlqS">Featured Image Credit: Sovfoto/Universal Images Group via Getty Images/MLADEN ANTONOV/AFP via Getty Images</cite></p>
<p><iframe title="Laika, the first animal to orbit Earth.  Hero Soviet space dog" width="640" height="480" src="https://www.youtube.com/embed/N7LYn9cLogs?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<hr />
<h1 class="site-page__title entry-title">Laika the ‘Space Dog’: Why Her Story Still Matters 60+ Years Later</h1>
<p>&nbsp;</p>
<p><iframe title="Laika a Soviet space dog who was one of the first animals in space and the first to orbit the Earth." width="640" height="360" src="https://www.youtube.com/embed/RksX4ORTC-o?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Laika weighed just over 10 pounds, and life as a stray dog in bustling 1950s Moscow likely terrified her. The city streets were packed with cars, sidewalks were constantly full of fast-moving human feet, and the temperature dropped far below freezing during winter. When a group of experimenters scooped up the little dog on a brisk October day in 1957, she had no way of knowing her life was about to get much worse. Over the next few weeks, Laika went from a stray dog to a “Space Dog” in training. Learn who Laika was and why even the experimenters who sentenced her to death eventually regretted their decision.</p>
<p>&nbsp;</p>
<figure class="wp-block-embed aligncenter is-type-rich is-provider-instagram wp-block-embed-instagram" data-beyondwords-marker="adda6df5-1834-4a39-9624-31b9ac423acd">
<div class="wp-block-embed__wrapper"><iframe id="instagram-embed-0" class="instagram-media instagram-media-rendered" src="https://www.instagram.com/p/DB7DPO9TI3o/embed/captioned/?cr=1&amp;v=14&amp;wp=916&amp;rd=https%3A%2F%2Fwww.peta.org&amp;rp=%2Fnews%2Flaika-space-dog%2F#%7B%22ci%22%3A0%2C%22os%22%3A902%7D" height="1130" frameborder="0" scrolling="no" allowfullscreen="allowfullscreen" data-instgrm-payload-id="instagram-media-payload-0" data-mce-fragment="1"></iframe></div>
</figure>
<h3 class="wp-block-heading" data-beyondwords-marker="f9e9a4fa-1e40-4e59-a551-e31dfaa70680"><strong>What Was Laika’s Space Mission?</strong></h3>
<p class="" data-beyondwords-marker="d8cc35a5-2840-4ca6-b00b-a21e4362fdbb">Just one month after experimenters picked her up off the streets of Moscow, they sent Laika on a one-way mission to space, to become the first living being to orbit the Earth. However, Laika would not survive for long. From the outset, the experimenters intended for Laika to die aboard Sputnik 2, terrified and alone in space.</p>
<h3 class="wp-block-heading" data-beyondwords-marker="de20071f-93dc-493f-bf08-c2c50a24da6a"><strong>Why Was Laika Sent Into Space?</strong></h3>
<p data-beyondwords-marker="b9b4b794-1841-4bfc-b62e-000f2a3e6841">Much like <a href="https://headlines.peta.org/take-action-end-experiments-dogs/">beagles who suffer in laboratories today</a>, Laika was chosen for her small size, gentle demeanor, and because she was considered expendable by the experimenters. According to federal statistics, approximately 48,000 dogs are used in experimentation each year in U.S. laboratories. Many of these dogs endure painful, debilitating, and pointless procedures. Their gentle and trusting nature is met not with kindness but with torment.</p>
<figure class="wp-block-image aligncenter size-large" data-beyondwords-marker="fc62a18b-71c3-48d2-86ce-8ec94a7358d9"><a href="https://www.peta.org/wp-content/uploads/2025/03/Bug-Beagle-HP.jpg"><img loading="lazy" decoding="async" class="wp-image-1148906 entered lazyloaded" src="https://www.peta.org/wp-content/uploads/2025/03/Bug-Beagle-HP-602x293.jpg" sizes="(max-width: 602px) 100vw, 602px" srcset="https://www.peta.org/wp-content/uploads/2025/03/Bug-Beagle-HP-602x293.jpg 602w, https://www.peta.org/wp-content/uploads/2025/03/Bug-Beagle-HP-300x146.jpg 300w, https://www.peta.org/wp-content/uploads/2025/03/Bug-Beagle-HP-768x374.jpg 768w, https://www.peta.org/wp-content/uploads/2025/03/Bug-Beagle-HP-750x365.jpg 750w, https://www.peta.org/wp-content/uploads/2025/03/Bug-Beagle-HP.jpg 780w" alt="Bug the beagle looks out from a barren enclosure" width="602" height="293" data-lazy-srcset="https://www.peta.org/wp-content/uploads/2025/03/Bug-Beagle-HP-602x293.jpg 602w, https://www.peta.org/wp-content/uploads/2025/03/Bug-Beagle-HP-300x146.jpg 300w, https://www.peta.org/wp-content/uploads/2025/03/Bug-Beagle-HP-768x374.jpg 768w, https://www.peta.org/wp-content/uploads/2025/03/Bug-Beagle-HP-750x365.jpg 750w, https://www.peta.org/wp-content/uploads/2025/03/Bug-Beagle-HP.jpg 780w" data-lazy-sizes="(max-width: 602px) 100vw, 602px" data-lazy-src="https://www.peta.org/wp-content/uploads/2025/03/Bug-Beagle-HP-602x293.jpg" data-ll-status="loaded" /></a></figure>
<div class="wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex" data-beyondwords-marker="b534ae91-80dd-48b3-999b-5a86367f05cd">
<h3 class="wp-block-button" data-beyondwords-marker="b4db4e75-b591-44ce-bb59-73479aa0d93a"><strong><a class="wp-block-button__link wp-element-button" href="https://headlines.peta.org/take-action-end-experiments-dogs/#action" target="_blank" rel="noopener">Take Action for Dogs Used in Experiments CLICK HERE TO HELP THE DOGS!</a></strong></h3>
</div>
<h2 class="wp-block-heading" data-beyondwords-marker="0890d204-82e1-45b8-a6b1-892eb59ca229"><strong>Prepped for Death: Laika and Other ‘Space Dogs’ Forced Through Space Training</strong></h2>
<p data-beyondwords-marker="0df533a3-1994-4618-a004-1ee43dc631a3">Laika and other “space dogs” in training, Albina and Mushka, were forced through harsh “training” methods so experimenters could choose the dog they would send into orbit. Experimenters kept the dogs in extreme confinement for days to accustom them to the cramped space capsule. This imprisonment reportedly caused the dogs to stop urinating and defecating—even when given laxatives—and their mental condition allegedly deteriorated. The dogs were also forced through centrifuge simulations that mimicked a space launch and exposed to loud, continuous noises, which reportedly caused their pulse rates to double and their blood pressure to spike, seemingly causing extreme terror for the dogs.</p>
<figure class="wp-block-embed aligncenter is-type-rich is-provider-instagram wp-block-embed-instagram" data-beyondwords-marker="480974d1-3cac-43c5-a788-440cb6d73ef1">
<div class="wp-block-embed__wrapper"><iframe id="instagram-embed-1" class="instagram-media instagram-media-rendered" src="https://www.instagram.com/reel/DIerC1-pkuw/embed/captioned/?cr=1&amp;v=14&amp;wp=916&amp;rd=https%3A%2F%2Fwww.peta.org&amp;rp=%2Fnews%2Flaika-space-dog%2F#%7B%22ci%22%3A1%2C%22os%22%3A903.5999999046326%7D" height="1076" frameborder="0" scrolling="no" allowfullscreen="allowfullscreen" data-instgrm-payload-id="instagram-media-payload-1" data-mce-fragment="1"></iframe></div>
</figure>
<p class="" data-beyondwords-marker="1bbe8f6f-e912-4aa7-b70e-2d39810ef10f">Eventually, the experimenters narrowed their search down to Laika and Albina. They forced both dogs to endure surgery, during which a device was implanted to monitor their vital signs in space.</p>
<p class="" data-beyondwords-marker="414ae550-e3dd-4f6b-8f7e-031eb6ac950d">Just over a week before launch, physician Vladimir Yazdovsky officially chose Laika as the flight dog, sentencing her to a terrifying and lonely death in outer space. Before the launch, Yazdovsky brought Laika home to play with his children.</p>
<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow" data-beyondwords-marker="66dde53a-5a3e-4f45-bb61-781e22fb1ccd">
<p class="" data-beyondwords-marker="501a6490-053b-4d4a-a667-c6b27259ca7d">“Laika was quiet and charming … I wanted to do something nice for her: She had so little time left to live.” –Vladimir Yazdovsky</p>
</blockquote>
<p data-beyondwords-marker="f23fb859-4b4f-4514-9451-637fa06e3332">The experimenters placed Laika in Sputnik 2’s capsule three days before launch. It was so cold at the launch site that a heater had to be connected to keep her container warm. Before the final lift-off on November 3, one of the technicians claimed, “After placing Laika in the container and before closing the hatch, we kissed her nose and wished her bon voyage, knowing that she would not survive the flight.”</p>
<figure class="wp-block-image aligncenter size-large wp-block-image--has-credit" data-beyondwords-marker="1e587e40-5002-43c6-9603-392aaa7c2335" data-media-credits="[{&quot;credit&quot;:&quot;ARCHIVIO GBB \/ Alamy Stock Photo&quot;,&quot;credit_link&quot;:&quot;&quot;}]">
<div class="wp-block-image__inner"><a href="https://www.peta.org/wp-content/uploads/2023/03/sovietic-center-space-research-laika-dog.jpg"><img loading="lazy" decoding="async" class="alignnone  wp-image-21393" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/sovietic-center-space-research-laika-dog.jpg" alt="" width="472" height="689" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/sovietic-center-space-research-laika-dog.jpg 959w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/sovietic-center-space-research-laika-dog-274x400.jpg 274w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/sovietic-center-space-research-laika-dog-701x1024.jpg 701w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/sovietic-center-space-research-laika-dog-768x1121.jpg 768w" sizes="(max-width: 472px) 100vw, 472px" /></a></p>
<div class="media-credit__wrap">
<div class="media-credit"><span class="media-credit__credit">ARCHIVIO GBB / Alamy Stock Photo</span></div>
</div>
</div>
</figure>
<div></div>
<div>
<div class="wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex" data-beyondwords-marker="b534ae91-80dd-48b3-999b-5a86367f05cd">
<h3 class="wp-block-button" data-beyondwords-marker="b4db4e75-b591-44ce-bb59-73479aa0d93a"><strong><a class="wp-block-button__link wp-element-button" href="https://headlines.peta.org/take-action-end-experiments-dogs/#action" target="_blank" rel="noopener">Take Action for Dogs Used in Experiments CLICK HERE TO HELP THE DOGS!</a></strong></h3>
</div>
<h2 class="wp-block-heading" data-beyondwords-marker="0890d204-82e1-45b8-a6b1-892eb59ca229"></h2>
</div>
<h3 class="wp-block-heading" data-beyondwords-marker="c65ee8cd-47e4-4e87-9e0c-afc9118a5bee"><strong>What Happened to Laika in Outer Space: Did Laika Survive?</strong></h3>
<p data-beyondwords-marker="c6f4eb5e-c78d-4b47-accb-875594241653">Laika was fitted with a harness and chains to restrict her movements aboard to sitting, standing, or lying down. The capsule was so tiny that even 11-pound Laika could not turn around. When Sputnik 2 hit peak acceleration, the sensors surgically implanted into her body revealed that Laika’s breathing rate was more than three times her normal pre-launch respiration rate, and her heart was pumping at 240 beats per minute, more than double her usual heart rate.</p>
<figure class="wp-block-image aligncenter size-large wp-block-image--has-credit" data-beyondwords-marker="f9729ec5-bc1e-4da3-b6c0-e0a246d8bf49" data-media-credits="[{&quot;credit&quot;:&quot;Pictorial Press Ltd \/ Alamy Stock Photo&quot;,&quot;credit_link&quot;:&quot;&quot;}]">
<div class="wp-block-image__inner"><img loading="lazy" decoding="async" class="alignnone  wp-image-21392" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/laika-sputnik2-space-mission-dog.webp" alt="" width="605" height="429" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/laika-sputnik2-space-mission-dog.webp 1400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/laika-sputnik2-space-mission-dog-400x284.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/laika-sputnik2-space-mission-dog-1024x726.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/laika-sputnik2-space-mission-dog-768x545.webp 768w" sizes="(max-width: 605px) 100vw, 605px" /></p>
<div class="media-credit__wrap">
<div class="media-credit"><span class="media-credit__credit">Pictorial Press Ltd / Alamy Stock Photo</span></div>
</div>
</div>
</figure>
<p class="" data-beyondwords-marker="8ad8554b-3a5a-41e5-928c-dd63ff2b5892">The experimenters behind the Sputnik 2 launch never planned for Laika to survive the journey into orbit. They organized a dose of poisoned food to kill Laika after a few days of orbiting Earth, but Laika only survived a few hours aboard the Sputnik 2. Initial reports from Russia claimed she lived several days in space, but in 2002, an experimenter from the Sputnik 2 mission officially revealed that Laika cooked to death within hours of launch, because the satellite’s cooling system failed to operate.</p>
<h3 class="wp-block-heading" data-beyondwords-marker="eb0e07bf-7dd6-45e7-8473-e8fe73789086"><strong>Is Laika’s Body Still in Orbit?</strong></h3>
<p data-beyondwords-marker="ec8e008e-8dd7-4c73-a49b-5fb7c04a19ca">Although Laika died just hours into the flight, her body circled Earth 2,570 times aboard the Sputnik 2. Five months after her death, the Sputnik 2 disintegrated during re-entry, officially ending the mission.</p>
<h2 class="wp-block-heading" data-beyondwords-marker="ed2e438c-02a6-49d9-a3f7-26ab3514a079"><strong>An Experimenter’s Regret: Why Laika’s Story Still Matters Today</strong></h2>
<p data-beyondwords-marker="7d6f71cf-4c4d-436c-b1a3-d086cba250e6">One of the mission’s leading experimenters, Oleg Gazenko, later regretted sending Laika into orbit.</p>
<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow" data-beyondwords-marker="c4761689-27f5-4065-b959-c3999a6af23a">
<p data-beyondwords-marker="3c30a30d-f3ee-4343-b8d1-5f9587bb1597">“The more time passes, the more I’m sorry about it. We shouldn’t have done it.” –Oleg Gazenko</p>
</blockquote>
<p data-beyondwords-marker="63e3a71c-2aeb-4952-96c9-7c7552717b88">Laika’s heartbreaking story is part of a larger pattern of cruelty where humans treat other animals as disposable tools instead of individuals. Her entire life, from the streets of Moscow as a stray to dying terrified and alone in outer space, was full of abuse and neglect. Humanity failed her—and millions of other animals—but we are learning from our mistakes.</p>
<p data-beyondwords-marker="05c509a9-10d5-4b4d-8ed7-f81e812a49d4">In 1996, <a href="https://www.peta.org/about-peta/milestones/">PETA successfully campaigned to get NASA to pull out of Bion</a>—a joint U.S., French, and Russian experiment in which experimenters forced monkeys into straitjackets and implanted electrodes in their bodies before launching them into space. <a href="https://www.peta.org/news/nasa-grounds-monkey-radiation-experiments/">And we got NASA’s plan to irradiate monkeys scrapped.</a></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21391" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/laika.jpg" alt="" width="1057" height="654" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/laika.jpg 1057w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/laika-400x247.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/laika-1024x634.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/laika-768x475.jpg 768w" sizes="(max-width: 1057px) 100vw, 1057px" /></p>
<p>&nbsp;</p>
<p data-beyondwords-marker="46413a4f-00dc-4545-a62b-062f2fbad131">The National Institutes of Health’s <a href="https://www.peta.org/news/the-nih-just-declared-a-scientific-revolution-and-it-could-save-millions-of-lives/">landmark decision</a> to shift funding away from cruel and outdated experiments on animals and instead prioritize non-animal research methods is a huge step forward for animals. Its new plan incorporates steps from PETA’s <a href="https://headlines.peta.org/research-modernization-new-deal/">Research Modernization NOW</a>—a detailed roadmap for replacing experiments on animals with superior, human-relevant methods. But animals still need your help! In memory of Laika, take action to help other animals suffering in experiments. <a href="https://www.peta.org/news/laika-space-dog/#:~:text=Although%20Laika%20died%20just%20hours,entry%2C%20officially%20ending%20the%20mission." target="_blank" rel="noopener">source</a></p>
<p><iframe title="Laika the dog first entered orbit 60 years ago" width="640" height="360" src="https://www.youtube.com/embed/I6poX9eah8g?start=3&#038;feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<div class="wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex" data-beyondwords-marker="b534ae91-80dd-48b3-999b-5a86367f05cd">
<h3 class="wp-block-button" data-beyondwords-marker="b4db4e75-b591-44ce-bb59-73479aa0d93a"><strong><a class="wp-block-button__link wp-element-button" href="https://headlines.peta.org/take-action-end-experiments-dogs/#action" target="_blank" rel="noopener">Take Action for Dogs Used in Experiments CLICK HERE TO HELP THE DOGS!</a></strong></h3>
</div>
<h2 class="wp-block-heading" data-beyondwords-marker="0890d204-82e1-45b8-a6b1-892eb59ca229"></h2>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DHS: Salt Typhoon hackers breached Army National Guard, exposing admin credentials and network diagrams</title>
		<link>https://goodshepherdmedia.net/dhs-salt-typhoon-hackers-breached-army-national-guard-exposing-admin-credentials-and-network-diagrams/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Wed, 23 Jul 2025 20:16:24 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[breached Army National Guard]]></category>
		<category><![CDATA[DHS: Salt Typhoon hack]]></category>
		<category><![CDATA[Salt Typhoon hackers breach]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21330</guid>

					<description><![CDATA[DHS: Salt Typhoon hackers breached Army National Guard, exposing admin credentials and network diagrams Following the &#8220;Salt Typhoon&#8221; breach, which compromised U.S. Army National Guard networks, a former Air National Guard servicemember stated that all U.S. forces should now operate under the assumption that their networks are compromised and will be degraded, according to Nextgov/FCW. This reflects [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="single-post-title">DHS: Salt Typhoon hackers breached Army National Guard, exposing admin credentials and network diagrams</h1>
<div class="WaaZC">
<div class="RJPOee EIJn2">
<div class="rPeykc" data-hveid="CAMQAQ" data-ved="2ahUKEwihv7D_n8yOAxXPM0QIHZo6AEcQo_EKegQIAxAB"><span data-huuid="12237279190710991000"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21332" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/hacker.jpg" alt="" width="800" height="450" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/hacker.jpg 800w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hacker-400x225.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hacker-768x432.jpg 768w" sizes="(max-width: 800px) 100vw, 800px" /></span></div>
<div class="rPeykc" data-hveid="CAMQAQ" data-ved="2ahUKEwihv7D_n8yOAxXPM0QIHZo6AEcQo_EKegQIAxAB"><span data-huuid="12237279190710991000">Following the &#8220;Salt Typhoon&#8221; breach, which compromised U.S. Army National Guard networks, a former Air National Guard servicemember stated that all U.S. forces should now operate under the assumption that their networks are compromised and will be degraded, <a class="uVhVib" href="http://www.fcw.com/cybersecurity/2025/07/salt-typhoon-hacks-national-guard-systems-serious-escalation-experts-warn/406765/?oref=ng-homepage-river" target="_blank" rel="noopener">accordin</a>g to Nextgov/FCW. </span><span data-huuid="12237279190710988909">This reflects a heightened state of alert and a need for enhanced cybersecurity measures due to the severity of the breach, which has been described as the &#8220;worst telecom breach&#8221; in American history.<span class="pjBG2e" data-cid="0797aaf2-ae2f-4700-a36d-426170506124"><span class="UV3uM"> </span></span></span></p>
<div class="NPrrbc" data-cid="0797aaf2-ae2f-4700-a36d-426170506124" data-uuids="12237279190710991000,12237279190710988909">
<div class="BMebGe btku5b fCrZyc LwdV0e FR7ZSc qVhvac OJeuxf" tabindex="0" role="button" aria-label="View related links" data-hveid="CAYQAQ" data-ved="2ahUKEwihv7D_n8yOAxXPM0QIHZo6AEcQ3fYKegQIBhAB">
<div class="niO4u">
<div class="kHtcsd"></div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="WaaZC">
<div class="RJPOee EIJn2">
<div class="rPeykc" data-hveid="CAsQAQ" data-ved="2ahUKEwihv7D_n8yOAxXPM0QIHZo6AEcQo_EKegQICxAB"><span data-huuid="12237279190710988823">The Salt Typhoon breach, attributed to hackers connected to China, targeted a U.S. state&#8217;s Army National Guard network, starting in March. </span><span data-huuid="12237279190710990828">The extent of the compromise and the potential for further damage have prompted this call for a more cautious approach to network security across all U.S. forces, according to Nextgov/FCW.</span></div>
</div>
</div>
<div data-hveid="CAsQAQ" data-ved="2ahUKEwihv7D_n8yOAxXPM0QIHZo6AEcQo_EKegQICxAB"></div>
<div data-hveid="CAsQAQ" data-ved="2ahUKEwihv7D_n8yOAxXPM0QIHZo6AEcQo_EKegQICxAB">
<p><iframe title="Salt Typhoon hack targeted National Guard computer networks" width="640" height="360" src="https://www.youtube.com/embed/xHuiRx6Tw18?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
<div class="WaaZC">
<div data-hveid="CAsQAQ" data-ved="2ahUKEwihv7D_n8yOAxXPM0QIHZo6AEcQo_EKegQICxAB">
<p>Officials with both the National Guard Bureau and the Department of Homeland Security (DHS) confirmed to MeriTalk today that the China-based Salt Typhoon hacking group targeted National Guard networks for attacks between March and December 2024.</p>
<p>These attacks have potentially far-reaching implications for the security of other National Guard unit networks and critical infrastructure entities that the guard helps to protect.</p>
<p>Both agencies indicated that the attacks targeted multiple National Guard networks, and that they have been working on steps to mitigate the impact of the attacks.</p>
<p>A <strong>re</strong><strong>p</strong><strong>ort</strong> from NBC News last night broke the news of the attacks, and cited as a primary source of its reporting a June 11 <a href="https://www.documentcloud.org/documents/25998809-20250611-dhs-salt-typhoon/"><strong>memo</strong></a> from DHS’s Office of Intelligence and Analysis detailing the Salt Typhoon attacks. That memo lays out how extensive the blast radius of the attack may have been.</p>
<p>“A recent compromise of a US state’s Army National Guard network by People’s Republic of China (PRC)-associated cyber actors – publicly tracked as Salt Typhoon – likely provided Beijing with data that could facilitate the hacking of other states’ Army National Guard units, and possibly many of their state-level cybersecurity partners,” the DHS memo says.</p>
<p>“If the PRC-associated cyber actors that conducted the hack succeeded in the latter, it could hamstring state-level cybersecurity partners’ ability to defend US critical infrastructure against PRC cyber campaigns in the event of a crisis or conflict,” the DHS memo warns.</p>
<p>The memo also offers guidance to help the National Guard and state governments to detect, prevent, and mitigate against threats emanating from the Salt Typhoon attacks.</p>
<p>The DHS memo goes on to say that that the Salt Typhoon attacks “extensively compromised” the unnamed state National Guard’s network, “and, among other things, collected its network configuration and its data traffic with its counterparts’ networks in every other US state and at least four US territories, according to a DOD [Defense Department] report.”</p>
<p>“This data also included these networks’ administrator credentials and network diagrams – which could be used to facilitate follow-on Salt Typhoon hacks of these units,” the memo says.</p>
<p>“Salt Typhoon has previously used exfiltrated network configuration files to enable cyber intrusions elsewhere,” the memo says, adding, “Between January and March 2024, Salt Typhoon exfiltrated configuration files associated with other US government and critical infrastructure entities, including at least two US state government agencies. At least one of these files later informed their compromise of a vulnerable device on another US government agency’s network.”</p>
<p>“Salt Typhoon’s success in compromising states’ Army National Guard networks nationwide could undermine local cybersecurity efforts to protect critical infrastructure,” the memo warns, adding, “In some 14 states, Army National Guard units are integrated with state fusion centers responsible for sharing threat information – including cyber threats. In at least one state, the local Army National Guard unit directly provides network defense services.”</p>
<p>“DHS regularly communicates threat information with its partners and in June shared an update on the People’s Republic of China-affiliated hacking group, Salt Typhoon, targeting National Guard networks between March and December 2024,” a DHS spokesperson said today.</p>
<p>“DHS is continuing to analyze these types of attacks and is coordinating closely with the National Guard and other partners to prevent future attacks and mitigate risk,” the spokesperson said.</p>
<p>“The National Guard is aware of recent Department of Defense and Department of Homeland Security reporting regarding the Peoples Republic of China-affiliated hacking group, Salt Typhoon, and their targeting of Army National Guard networks between March and December 2024,” a spokesperson for the National Guard Bureau told MeriTalk today.</p>
<p>“While we cannot provide specific details on the attack or our response to it, we can say this attack has not prevented the National Guard from accomplishing assigned state or federal missions, and that NGB continues to investigate the intrusion to determine its full scope,” the spokesperson said.</p>
<p>“We are taking this matter extremely seriously,” the spokesperson said. “Security protocols are in place to mitigate further risk and contain any potential data compromises, and the response is ongoing. We are coordinating closely with DHS and other federal partners.”</p>
<p>At least one private sector cybersecurity expert reacted with considerable alarm to the news.</p>
<p>“Salt Typhoon’s compromise of the US National Guard is a significant event and potentially poses a serious threat to many Department of Defense systems,” said Gary Barlet, Illumio’s public sector chief technology officer.</p>
<p>“Going forward, all US forces must now assume their networks are compromised and will be degraded,” Barlet warned.</p>
<p>This isn’t the first breach of Department of Defense systems we’ve seen,” Barlet said. “There have been numerous instances across both the public and private sector where sensitive information has been compromised and critical systems accessed via lateral movement.”</p>
<p>“In fact, the <strong><a href="https://www.illumio.com/news/cost-of-ransomware-study">Ponemon Institute</a></strong> highlighted that 55% of organizations admitted a compromised device had infected other devices on the network,” he said.</p>
<p>“The ability of groups such as Salt Typhoon to move laterally across different units and systems is why government agencies must accelerate Zero Trust adoption and go even further with a breach containment strategy,” Barlet emphasized. “It is critical that services and data remain secure even when attackers have compromised a section of the network.”</p>
<p>The Salt Typhoon and related Volt Typhoon hacking groups backed by the Chinese government have emerged in recent years as sophisticated threat actors. Earlier this year, a U.S. intelligence community report <strong>said</strong> that the PRC poses the biggest cyber threat to the United States. <a href="https://www.meritalk.com/articles/dhs-national-guard-confirm-salt-typhoon-attacks-on-guard-networks/" target="_blank" rel="noopener">source</a></p>
</div>
</div>
<p id="anchor-8046ae" class="body-graf">An elite Chinese cyberspy group hacked at least one state’s National Guard network for nearly a year, the Department of Defense has found.</p>
<p id="anchor-72a2f6" class="body-graf">The hackers, already responsible for one of the most expansive cyberespionage campaigns against the U.S. to date, are alleged to have burrowed even further than previously known and may have obtained sensitive military or law enforcement information. Authorities are still working to discover the extent of the data accessed.</p>
<p id="anchor-225054" class="body-graf">A Department of Homeland Security <a href="https://www.documentcloud.org/documents/25998809-20250611-dhs-salt-typhoon/" target="_blank" rel="noopener">memo from June</a>, describing the Pentagon’s findings, said that the group, publicly known by the nickname Salt Typhoon, “extensively compromised a U.S. state’s Army National Guard network” from March 2024 through December. The memo did not say which state.</p>
<p id="anchor-e19aa3" class="body-graf">The report was provided to NBC News through the national security transparency nonprofit Property of the People, which obtained it through a freedom of information request.</p>
<p id="anchor-cb9f01" class="body-graf">The Department of Defense didn’t respond to a request for comment. A National Guard Bureau spokesperson confirmed the compromise but declined to share details.</p>
<p id="anchor-ffa686" class="body-graf">“While we cannot provide specific details on the attack or our response to it, we can say this attack has not prevented the National Guard from accomplishing assigned state or federal missions, and that NGB continues to investigate the intrusion to determine its full scope,” the spokesperson said.</p>
<p id="anchor-87fa2a" class="body-graf">A spokesperson for China’s embassy in Washington did not deny the campaign but said the U.S. has failed to prove China is behind the Salt Typhoon hacks.</p>
<p id="anchor-85c708" class="body-graf">“Cyberattacks are a common threat faced by all countries, China included,” the spokesperson said, adding that the U.S. “has been unable to produce conclusive and reliable evidence that the ‘Salt Typhoon’ is linked to the Chinese government.</p>
<p id="anchor-384df2" class="body-graf">Salt Typhoon is notorious even by the standards of China’s massive cyberspy efforts because of its ability to jump from one organization to another. Last year, U.S. authorities found that it had hacked <a href="https://www.nbcnews.com/tech/security/chinese-hackers-stole-americans-phone-data-8-telecoms-us-officials-say-rcna182942" target="_blank" rel="noopener">at least eight</a> of the country’s largest internet and phone companies, including AT&amp;T and Verizon, using access to <a href="https://www.nbcnews.com/tech/security/china-phone-target-hack-trump-vance-harris-rcna177383" target="_blank" rel="noopener">spy on the calls and text messages</a> of both the Harris and Trump presidential campaigns, as well as the office of then-Senate Majority Leader Chuck Schumer.</p>
<p id="anchor-f2148e" class="body-graf">While part of the Department of Defense, National Guard units are also under the authority of their states; some are deeply integrated with local governments or law enforcement, which may have given the Salt Typhoon hackers the ability to compromise other organizations.</p>
<p id="anchor-3b146e" class="body-graf">The hack “likely provided Beijing with data that could facilitate the hacking of other states’ Army National Guard units, and possibly many of their state-level cybersecurity partners,” the DHS report found. The National Guard in 14 U.S. states work with law enforcement “fusion centers” to share intelligence, the DHS memo notes. The hackers accessed a map of geographic locations in the targeted state, diagrams of how internal networks are set up, and personal information of service members, it said.</p>
<p id="anchor-0e3f15" class="body-graf">In January, the Treasury Department — also a recent target of alleged Chinese hacking — <a href="https://home.treasury.gov/news/press-releases/sb0042" target="_blank" rel="noopener">sanctioned a Sichuan company</a> for allegedly helping Beijing’s Ministry of State Security conduct Salt Typhoon operations.</p>
<p id="anchor-807819" class="endmark body-graf">Salt Typhoon can be pernicious and hard to root out once the hackers take hold. In the AT&amp;T case, <a href="https://www.reuters.com/technology/cybersecurity/chinese-salt-typhoon-cyberespionage-targets-att-networks-secure-carrier-says-2024-12-29/" target="_blank" rel="noopener">the company announced</a> in December that it appeared as if they were no longer being affected and <a href="https://www.verizon.com/about/news/verizon-provides-update-salt-typhoon-matter" target="_blank" rel="noopener">Verizon said in January it had “contained”</a> the incident. Both companies stopped short of saying they were fully protected from the hackers returning. A <a href="https://blog.talosintelligence.com/salt-typhoon-analysis/" target="_blank" rel="noopener">report from Cisco</a> said that, in at least one instance, Salt Typhoon hackers remained in an affected environment for up to three years. <a href="https://www.nbcnews.com/tech/security/national-guard-was-hacked-chinas-salt-typhoon-group-dhs-says-rcna218648" target="_blank" rel="noopener">source</a></p>
<hr />
<h1 class="single-post-title"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21333" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/china-hacks-us-1-1024x585-1.jpg" alt="" width="1024" height="585" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/china-hacks-us-1-1024x585-1.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/china-hacks-us-1-1024x585-1-400x229.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/china-hacks-us-1-1024x585-1-768x439.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></h1>
<h1 class="single-post-title">DHS: Salt Typhoon hackers breached Army National Guard, exposing admin credentials and network diagrams</h1>
<p>A U.S. Department of Homeland Security (DHS) memo circulated in June revealed that a Chinese cyberespionage group known as Salt Typhoon ‘extensively compromised a U.S. state’s Army National Guard network over nine months in 2024. The memo, which cites findings from the Department of Defense, said the breach lasted from March through December and did not specify which state was targeted. It also revealed that the stolen data included administrator credentials and detailed network diagrams, basically information that could enable Salt Typhoon hackers to carry out follow-on attacks against the compromised installations.</p>
<p>The memo, however, <a href="https://www.documentcloud.org/documents/25998809-20250611-dhs-salt-typhoon/" target="_blank" rel="noreferrer noopener">noted that</a> “If the PRC-associated cyber actors that conducted the hack succeeded in the latter, it could hamstring state-level cybersecurity partners’ ability to defend US critical infrastructure against PRC cyber campaigns in the event of a crisis or conflict.”</p>
<p>The DHS also identified that in 2023 and 2024, Salt Typhoon also stole 1,462 network configuration files associated with approximately 70 U.S. government and critical infrastructure entities from 12 sectors, including energy, <a href="https://industrialcyber.co/critical-infrastructure/ericsson-to-lead-security-first-overhaul-of-telecom-defense-as-nation-state-cyber-threats-intensify-in-2025/">communications</a>, transportation, and water and wastewater sectors. “These configuration files could enable further computer network exploitation of other networks, including data capture, administrator account manipulation, and <a href="https://industrialcyber.co/ics-security-framework/vedere-labs-details-deep-lateral-movement-in-ot-networks-provides-mitigation-strategies/">lateral movement</a> between networks, according to CISA reporting and NSA guidance.”</p>
<p>Salt Typhoon, already tied to some of the most aggressive cyber operations against the U.S., is now believed to have gained deeper access than previously known, raising concerns that the hackers may have obtained sensitive military or law enforcement information. Federal officials are still investigating the extent of the data exposure.</p>
<p>A National Guard Bureau spokesperson <a href="https://www-nbcnews-com.cdn.ampproject.org/c/s/www.nbcnews.com/news/amp/rcna218648" target="_blank" rel="noreferrer noopener">confirmed</a> the compromise to NBC News, but declined to share details. “While we cannot provide specific details on the attack or our response to it, we can say this attack has not prevented the National Guard from accomplishing assigned state or federal missions, and that NGB continues to investigate the intrusion to determine its full scope,” the spokesperson said.</p>
<p>The DHS revealed that between January and March 2024, Salt Typhoon exfiltrated configuration files associated with other U.S. government and critical infrastructure entities, including at least two U.S. state government agencies. At least one of these files later informed them of a compromise of a vulnerable device on another U.S. government agency’s network.</p>
<p>It added that Salt Typhoon’s success in compromising states’ Army National Guard networks nationwide could undermine local cybersecurity efforts to protect critical infrastructure. “In some 14 states, Army National Guard units are integrated with state fusion centers responsible for sharing threat information—including cyber threats. In at least one state, the local Army National Guard unit directly provides network defense services.”</p>
<p>The memo also identified that Salt Typhoon access to Army National Guard networks in these states could include information on state cyber defense posture, as well as the personally identifiable information (PII) and work locations of state cybersecurity personnel data that could be used to inform future cyber-targeting efforts.</p>
<p>According to DOD reporting, in 2024, Salt Typhoon used its access to a US state’s Army National Guard network to exfiltrate administrator credentials, network traffic diagrams, a map of geographic locations throughout the state, and PII of its service members.</p>
<p>The DHS memo surfaces as senior cybersecurity officials from the National Security Agency and the FBI report progress in disrupting Chinese cyber campaigns targeting U.S. critical infrastructure.</p>
<p>Speaking Tuesday at the International Conference on Cyber Security at Fordham University in New York City, experts <a href="https://therecord.media/china-typhoon-hackers-nsa-fbi-response" target="_blank" rel="noreferrer noopener">detailed</a> Beijing’s so-called Typhoon campaigns, where coordinated efforts involving both Chinese government entities and private sector actors aimed at infiltrating U.S. government agencies and critical infrastructure installations.</p>
<p>Kristina Walter, director of the NSA’s Cybersecurity Collaboration Center, focused on <a href="https://industrialcyber.co/critical-infrastructure/uat-5918-apt-group-targets-taiwan-critical-infrastructure-possible-linkage-to-volt-typhoon/">Volt Typhoon,</a> an effort by Chinese actors to preposition themselves on U.S. critical infrastructure for disruptive or destructive cyberattacks in the event of a <a href="https://industrialcyber.co/analysis/digital-battlegrounds-evolving-hybrid-kinetic-warfare/">kinetic conflict</a> centered around Taiwan.</p>
<p>“The good news is, they really failed. They wanted to persist in domestic networks very quietly for a very long time so that if and when they needed to disrupt those networks, they could. They were not successful in that campaign,” she said.</p>
<p>“We, with private sector, with FBI, found them, understood how they were using the operating systems, how they’re using legitimate credentials to maintain persistence, and frankly, we equipped the entire private sector and U.S. government to hunt for them and detect them.”</p>
<p>Walter did not offer further details about those efforts. She said that after the NSA and other agencies released a <a href="https://industrialcyber.co/critical-infrastructure/cyber-attacks-continue-to-hit-critical-infrastructure-exposing-vulnerabilities-in-oil-water-healthcare-sectors/">public advisory in 2024</a>, owners of <a href="https://industrialcyber.co/industrial-cyber-attacks/cyble-warns-hacktivists-shift-tactics-targeting-critical-infrastructure-with-ics-attacks-data-breaches-intrusions/">critical infrastructure</a> reached out to them to confirm that they had found evidence of Volt Typhoon and ask for help.</p>
<p>Brett Leatherman, who was <a href="https://industrialcyber.co/critical-infrastructure/federal-cyber-posts-see-fresh-faces-amid-push-to-boost-national-resilience-reinforce-digital-defenses/">recently appointed</a> assistant director for cyber at the FBI, echoed those remarks and noted that Volt Typhoon was specifically focused on critical infrastructure centered around the U.S. Navy, particularly <a href="https://therecord.media/chinese-hackers-behind-guam-hack-targeting-us-for-years" target="_blank" rel="noreferrer noopener">in island communities like Guam</a>.</p>
<p>He said U.S. efforts to shine a light on the campaign forced Chinese actors to pull back, adapt their tactics, and burn previous methods they used to breach critical infrastructure systems. The publicity fostered by U.S. agencies forced Chinese groups to come up with new ways to breach organizations while also providing ways for private industry to better defend itself.</p>
<p>“Even if you’re not dismantling that network — we’re never going to dismantle the CCP hacking apparatus — but if you can bring real relief to victims, you’re also protecting national security by doing that, and that’s why public attribution is so important when it comes to PRC hacking activity,” he said.</p>
<p>Commenting on the DHS memo, Ensar Seker, CISO at SOCRadar, wrote in an emailed statement that the revelation that Salt Typhoon maintained access to a U.S. National Guard network for nearly a year is a serious escalation in the cyber domain.</p>
<p>“This isn’t just an opportunistic intrusion. It reflects deliberate, long-term espionage designed to quietly extract strategic intelligence. The group’s sustained presence suggests they were gathering more than just files, they were likely mapping infrastructure, monitoring communication flows, and identifying exploitable weak points for future use,” according to Seker. “What’s deeply concerning is that this activity went undetected for so long in a military environment. It raises questions about visibility gaps, segmentation policies, and detection capabilities in hybrid federal-state defense networks.”</p>
<p>He added that it’s another reminder that advanced persistent threat actors like Salt Typhoon are not only targeting federal agencies but also state-level components, where the security posture might be more varied.</p>
<p>“In a time where we are often fooled into thinking cybercrime means somebody telling us that we missed jury duty, or convincing our loved ones of a long-distance romantic relationship, we sometimes miss the fact that this is more than a game and is played at the nation state level,” Erich Kron, security awareness advocate at KnowBe4, wrote in an emailed statement. “Cybercrime has real dangers for real people and real governments as well. The Typhoon groups, several different alleged Chinese-backed cybercrime groups that carry the ‘Typhoon’ moniker as part of their name, have been known to be very stealthy and very effective. While this was at the state level with the National Guard, it still goes to demonstrate that even our military forces are at risk from these cybercrime groups.”</p>
<p>He added that “These criminal groups must be taken seriously, which means that everyone from senior government leadership to the average citizen needs to be at least somewhat aware of the threats, how to spot them, and who to report them to. Whether it’s stealing money from individuals to fund other operations or trying to cripple infrastructure through cyberattacks, these bad actors are a clear and present danger.” <a href="https://industrialcyber.co/critical-infrastructure/dhs-salt-typhoon-hackers-breached-army-national-guard-exposing-admin-credentials-and-network-diagrams/" target="_blank" rel="noopener">source</a></p>
<hr />
<div class="dw-term-title">
<h1>Major US telecom hack prompts security push after Salt Typhoon attack</h1>
<p><iframe title="Salt Typhoon ‘largely contained’ in telecom networks; Pentagon AI office eliminates CTO directorate" width="640" height="360" src="https://www.youtube.com/embed/R__Ikzi4HGM?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
<div class="updates-excerpt dw-content-box-p">
<p>Officials urge stronger defences after Chinese hackers infiltrated major US telecom networks.</p>
<div class="dw-term-description dw-content-box-p">
<p id="Lawmakershave">Lawmakers <a href="https://www.reuters.com/technology/cybersecurity/senators-say-us-must-boost-security-after-chinese-salt-typhoon-telecom-hacking-2024-12-11/" target="_blank" rel="noreferrer noopener nofollow">have called</a> for urgent measures to strengthen US telecommunications security following a massive cyberattack linked to China. The hacking campaign, referred to as Salt Typhoon, targeted American telecom companies, compromising vast amounts of metadata and call records. Federal agencies have briefed Congress on the incident, which officials say could be the largest telecom breach in US history.</p>
<p id="SenatorBen">Senator Ben Ray Luján described the hack as a wake-up call, urging the full implementation of federal recommendations to secure networks. Senator Ted Cruz warned of future threats, emphasising the need to close vulnerabilities in critical infrastructure. Debate also surfaced over the role of offensive cybersecurity measures, with Senator Dan Sullivan questioning whether deterrence efforts are adequate.</p>
<p id="TheWhite">The White House reported that <a href="https://dig.watch/updates/salt-typhoon-cyberespionage-operation-raises-alarm-over-us-telecommunications-security-vulnerabilities" target="_blank" rel="noreferrer noopener">at least eight telecommunications firms were affected</a>, with significant data theft. In response, Federal Communications Commission Chairwoman Jessica Rosenworcel proposed annual cybersecurity certifications for telecom companies. Efforts to replace insecure Chinese-made equipment in US networks continue, but funding shortfalls have hampered progress.</p>
<p id="Chinahas"><a href="https://dig.watch/countries/china" target="_blank" rel="noreferrer noopener">China</a> has dismissed the allegations, claiming opposition to all forms of cybercrime. However, US officials have cited evidence of data theft involving companies like Verizon, AT&amp;T, and Lumen. Congress is set to vote on a defence bill allocating $3.1 billion to remove and replace vulnerable telecom hardware. <a href="https://dig.watch/updates/major-us-telecom-hack-prompts-security-push-after-salt-typhoon-attack" target="_blank" rel="noopener">source</a></p>
</div>
</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Babbage Difference Engine #2</title>
		<link>https://goodshepherdmedia.net/the-babbage-difference-engine-2/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 21 Jul 2025 08:31:06 +0000</pubDate>
				<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Interestingly Extinct Technology]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[The Babbage Difference Engine #2]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21322</guid>

					<description><![CDATA[The Babbage Difference Engine #2 A difference engine is an automatic mechanical calculator designed to tabulate polynomial functions. It was designed in the 1820s, and was created by Charles Babbage. The name difference engine is derived from the method of finite differences, a way to interpolate or tabulate functions by using a small set of polynomial co-efficients. Some of the most common mathematical functions used in engineering, [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="WaaZC">
<h1 data-hveid="CCsQAQ" data-ved="2ahUKEwjj1rT2_cqOAxVwE0QIHQvNKs8Qo_EKegQIKxAB">The Babbage Difference Engine #2</h1>
<div data-hveid="CCsQAQ" data-ved="2ahUKEwjj1rT2_cqOAxVwE0QIHQvNKs8Qo_EKegQIKxAB"></div>
<div data-hveid="CCsQAQ" data-ved="2ahUKEwjj1rT2_cqOAxVwE0QIHQvNKs8Qo_EKegQIKxAB">A <b>difference engine</b> is an automatic mechanical calculator designed to tabulate polynomial functions. It was designed in the 1820s, and was created by Charles Babbage. The name <i>difference engine</i> is derived from the method of finite differences, a way to interpolate or tabulate functions by using a small set of polynomial co-efficients. Some of the most common mathematical functions used in engineering, science and navigation are built from logarithmic and trigonometric functions, which can be approximated by polynomials, so a difference engine can compute many useful tables.</div>
<div data-hveid="CCsQAQ" data-ved="2ahUKEwjj1rT2_cqOAxVwE0QIHQvNKs8Qo_EKegQIKxAB"></div>
<div class="rPeykc" data-hveid="CCsQAQ" data-ved="2ahUKEwjj1rT2_cqOAxVwE0QIHQvNKs8Qo_EKegQIKxAB">
<p><span data-huuid="17174816123811005211">A Difference Engine is <mark class="QVRyCf">a mechanical calculator designed to automatically compute and print mathematical tables, specifically focusing on polynomial functions</mark>. </span><span data-huuid="17174816123811006456">It was conceived by Charles Babbage in the 1820s, based on the mathematical principle of finite differences. </span><span data-huuid="17174816123811007701">While Babbage never fully completed his Difference Engine, his designs and the work of others demonstrated its potential for automating complex calculations and producing accurate tables used in fields like navigation and astronomy.</span></p>
<div class="NPrrbc" data-cid="6bc3d8d6-5123-4c78-885e-b54a661d422f" data-uuids="17174816123811005211,17174816123811006456,17174816123811007701">
<div class="BMebGe btku5b fCrZyc LwdV0e FR7ZSc qVhvac OJeuxf" tabindex="0" role="button" aria-label="View related links" data-hveid="CCoQAQ" data-ved="2ahUKEwjj1rT2_cqOAxVwE0QIHQvNKs8Q3fYKegQIKhAB">
<div class="niO4u">
<div class="kHtcsd"></div>
</div>
</div>
</div>
</div>
</div>
<div data-hveid="CCsQAQ" data-ved="2ahUKEwjj1rT2_cqOAxVwE0QIHQvNKs8Qo_EKegQIKxAB">
<p><iframe title="A demo of Charles Babbage&#039;s Difference Engine" width="640" height="360" src="https://www.youtube.com/embed/BlbQsKpq3Ak?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
<div data-hveid="CCsQAQ" data-ved="2ahUKEwjj1rT2_cqOAxVwE0QIHQvNKs8Qo_EKegQIKxAB"></div>
<div data-hveid="CCsQAQ" data-ved="2ahUKEwjj1rT2_cqOAxVwE0QIHQvNKs8Qo_EKegQIKxAB"></div>
<div class="WaaZC">
<div class="rPeykc" data-hveid="CBoQAQ" data-ved="2ahUKEwjj1rT2_cqOAxVwE0QIHQvNKs8Qo_EKegQIGhAB">Key Features and Functionality:</div>
</div>
<div class="WaaZC">
<div id="FqR8aOPzMfCmkPIPi5qr-Qw__80" class="bsmXxe">
<div id="FqR8aOPzMfCmkPIPi5qr-Qw__86" class="bsmXxe">
<div class="zMgcWd dSKvsb" data-il="">
<div data-crb-p="">
<div class="xFTqob">
<ul>
<li class="Gur8Ad"><span data-huuid="17174816123811005373"><strong>Automatic Calculation: </strong></span><span data-huuid="17174816123811006618">The Difference Engine was designed to automatically calculate and print tables of values for polynomial functions, eliminating the need for manual computation and reducing the risk of human error, according to the Science Museum.</span></li>
<li><span data-huuid="17174816123811005012"><strong>Finite Differences: </strong></span><span data-huuid="17174816123811006257">The engine operated based on the method of finite differences, which relies on repeated addition to solve polynomials, making it suitable for mechanical implementation.</span></li>
<li><strong>Mechanical Construction: </strong><span data-huuid="17174816123811005896">The Difference Engine was a complex mechanical device, consisting of thousands of gears, levers, and other parts. </span></li>
<li><strong>Storage and Printing: </strong><span data-huuid="17174816123811005535">It included features like temporary data storage and the ability to print its results, both on paper and into a mold for printing plates, says Britannica Kids.<span class="pjBG2e" data-cid="6000ed05-ff7e-401b-b39b-be0457488e63"><span class="UV3uM"> </span></span></span></li>
</ul>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="WaaZC">
<div id="FqR8aOPzMfCmkPIPi5qr-Qw__113" class="bsmXxe">
<div class="rPeykc pyPiTc" data-hveid="CI4BEAE" data-ved="2ahUKEwjj1rT2_cqOAxVwE0QIHQvNKs8Qo_EKegUIjgEQAQ"><span data-huuid="17174816123811008025">Significance and Impact:</span></div>
</div>
</div>
<div class="WaaZC">
<div id="FqR8aOPzMfCmkPIPi5qr-Qw__73" class="bsmXxe">
<div id="FqR8aOPzMfCmkPIPi5qr-Qw__77" class="bsmXxe">
<div class="zMgcWd dSKvsb" data-il="">
<div data-crb-p="">
<div class="xFTqob">
<ul>
<li class="Gur8Ad"><span data-huuid="17174816123811007664"><strong>Precursor to Modern Computers: </strong></span><span data-huuid="17174816123811004813">Although a mechanical device, the Difference Engine represented a significant step towards the development of modern computers. </span><span data-huuid="17174816123811006058">It demonstrated the potential of automating complex calculations and introduced concepts like data storage and output.</span></li>
<li class="Gur8Ad"><strong>Addressing Human Error: </strong><span data-huuid="17174816123811005697">The engine was designed to address the problem of human error in producing mathematical tables, which were crucial for navigation, astronomy, and other scientific fields.</span></li>
<li class="Gur8Ad"><strong>Historical Context: </strong><span data-huuid="17174816123811005336">The Difference Engine was a product of its time, reflecting the advancements in engineering and the growing need for automated computation in the 19th century.</span></li>
<li class="Gur8Ad"><strong>Limited Adoption: </strong><span data-huuid="17174816123811004975">While Babbage&#8217;s designs were influential, the full-scale Difference Engine was never completed due to construction challenges and funding issues. </span><span data-huuid="17174816123811006220">However, other versions were built by individuals like <span class="M5tQyf">Georg and Edvard Scheutz.</span></span></li>
<li class="Gur8Ad">In essence, the Difference Engine was a revolutionary idea that paved the way for modern computing by automating mathematical calculations and introducing key concepts that would later be incorporated into electronic computers. <span data-huuid="17174816123811005859">The Computer History Museum notes. </span></li>
</ul>
<div class="mw-heading mw-heading3">
<h3 id="Charles_Babbage's_difference_engines">Charles Babbage&#8217;s difference engines</h3>
</div>
<p>Charles Babbage began to construct a small difference engine in <abbr title="circa">c.</abbr> 1819 and had completed it by 1822 (Difference Engine 0). He announced his invention on 14 June 1822, in a paper to the Royal Astronomical Society, entitled &#8220;Note on the application of machinery to the computation of astronomical and mathematical tables&#8221;. This machine used the decimal number system and was powered by cranking a handle. The British government was interested, since producing tables was time-consuming and expensive and they hoped the difference engine would make the task more economical.</p>
<p>In 1823, the British government gave Babbage £1700 to start work on the project. Although Babbage&#8217;s design was feasible, the metalworking techniques of the era could not economically make parts in the precision and quantity required. Thus the implementation proved to be much more expensive and doubtful of success than the government&#8217;s initial estimate. According to the 1830 design for Difference Engine No. 1, it would have about 25,000 parts, weigh 4 tons,and operate on 20-digit numbers by sixth-order differences. In 1832, Babbage and Joseph Clement produced a small working model (one-seventh of the plan), which operated on 6-digit numbers by second-order differences.Lady Byron described seeing the working prototype in 1833: &#8220;We both went to see the thinking machine (or so it seems) last Monday. It raised several Nos. to the 2nd and 3rd powers, and extracted the root of a Quadratic equation.&#8221; Lady Byron&#8217;s daughter Ada Lovelace would later become fascinated with and work on creating the first computer program intended to solve Bernoulli&#8217;s equation utilizing the difference engine. Work on the larger engine was suspended in 1833.</p>
<p>By the time the government abandoned the project in 1842,Babbage had received and spent over £17,000 on development, which still fell short of achieving a working engine. The government valued only the machine&#8217;s output (economically produced tables), not the development (at unpredictable cost) of the machine itself. Babbage refused to recognize that predicament. Meanwhile, Babbage&#8217;s attention had moved on to developing an analytical engine, further undermining the government&#8217;s confidence in the eventual success of the difference engine. By improving the concept as an analytical engine, Babbage had made the difference engine concept obsolete, and the project to implement it an utter failure in the view of the government.</p>
<p>The incomplete Difference Engine No. 1 was put on display to the public at the 1862 International Exhibition in South Kensington, London.</p>
<p>Babbage went on to design his much more general analytical engine, but later designed an improved &#8220;Difference Engine No. 2&#8221; design (31-digit numbers and seventh-order differences), between 1846 and 1849. Babbage was able to take advantage of ideas developed for the analytical engine to make the new difference engine calculate more quickly while using fewer parts <a href="https://en.wikipedia.org/wiki/Difference_engine" target="_blank" rel="noopener">source</a></p>
</div>
<p><iframe title="The Babbage Difference Engine #2 at CHM" width="640" height="360" src="https://www.youtube.com/embed/be1EM3gQkAY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
</div>
</div>
</div>
</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ESP32-DIV: Your Swiss Army Knife for Wireless Networks</title>
		<link>https://goodshepherdmedia.net/esp32-div-your-swiss-army-knife-for-wireless-networks/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Tue, 15 Jul 2025 20:12:18 +0000</pubDate>
				<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[ESP32-DIV]]></category>
		<category><![CDATA[ESP32-DIV Your Swiss Army Knife for Wireless Networks]]></category>
		<category><![CDATA[ESP32-Div: An ESP32 Based Swiss Army Knife for Wireless Networks]]></category>
		<category><![CDATA[Hacking Wireless Networks]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21116</guid>

					<description><![CDATA[ESP32-DIV: Your Swiss Army Knife for Wireless Networks ESP32-Div: An ESP32 Based Swiss Army Knife for Wireless Networks Hardware of ESP32-DIV The ESP32-DIV is a compact yet powerful device, built from two main sections: the Main Board and the Shield. Together, they enable Wi-Fi, BLE, 2.4GHz, and Sub-GHz operations. Below is a breakdown of the hardware components. 🛠️ Main Board [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="elementor-heading-title elementor-size-default">ESP32-DIV: Your Swiss Army Knife for Wireless Networks</h1>
<blockquote>
<h4><span style="color: #0000ff;">ESP32-Div: An ESP32 Based Swiss Army Knife for Wireless Networks</span></h4>
</blockquote>
<div class="markdown-heading">
<h1 class="heading-element">Hardware of ESP32-DIV</h1>
<p><iframe title="ESP32 DIV DIY INSTALLATION @techcifer" width="640" height="360" src="https://www.youtube.com/embed/AR7GJnTj3u0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
<p>The <strong>ESP32-DIV</strong> is a compact yet powerful device, built from two main sections: the <strong>Main Board</strong> and the <strong>Shield</strong>. Together, they enable Wi-Fi, BLE, 2.4GHz, and Sub-GHz operations. Below is a breakdown of the hardware components.</p>
<div class="markdown-heading">
<h2 class="heading-element"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6e0.png" alt="🛠" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Main Board</h2>
<p>&nbsp;</p>
</div>
<ul>
<li><strong>LF33</strong>: Voltage regulator providing a stable 3.3V supply for reliable operation.</li>
<li><strong>TP4056</strong>: Lithium battery charger with built-in protection for safe battery management.</li>
<li><strong>CP2102</strong>: USB-to-serial converter for flashing firmware and serial communication.</li>
<li><strong>PCF8574</strong>: I/O expander to manage multiple button inputs for user interaction.</li>
<li><strong>SD Card Slot</strong>: Stores captured signals, logs, and configurations.</li>
<li><strong>ESP32-U (16MB)</strong>: The core microcontroller with Wi-Fi and BLE capabilities, featuring 16MB flash memory.</li>
<li><strong>Antenna Connector</strong>: Supports external antennas for enhanced signal range.</li>
<li><strong>ILI9341 TFT Display</strong>: 2.8-inch screen for user interface and real-time data visualization.</li>
<li><strong>Push Buttons</strong>: For navigating menus and interacting with the device.</li>
</ul>
<div class="markdown-heading">
<h2 class="heading-element"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6e1.png" alt="🛡" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Shield</h2>
<p>&nbsp;</p>
</div>
<ul>
<li><strong>3 x NRF24 Modules</strong>: Enable 2.4GHz operations, including scanning, jamming, and protocol analysis.</li>
<li><strong>CC1101 Module</strong>: Sub-GHz transceiver for replay attacks, jamming, and signal capture.</li>
</ul>
<p><iframe title="ESP32-DIV: Your Swiss Army Knife for Wireless Networks" width="640" height="360" src="https://www.youtube.com/embed/jVp1zlcsrOY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>White Hacker Cyber Security Pro <span style="color: #0000ff;"><em><strong>Cifer</strong> </em></span>&#8221; ESP32-Div is a multi-featured wireless analysis device for WiFi, Bluetooth, 2.4 GHz, and sub-GHz signals. While ESP32-Div is not based on SDR technology, it is still an interesting device for wireless hackers to discuss.</p>
<p>ESP32-Div can monitor WiFi packets, spam fake WiFi access points, scan for deauth attacks, and scan nearby WiFi networks. For Bluetooth, it can jam, scan, spoof, and cause unintended behaviours on Apple devices via spoofing the AirDrop function. It can also be used as a general 2.4 GHz scanner and jammer. Finally, it can perform replay attacks and jam signals for sub-GHz signals.</p>
<p>The device consists of a custom PCB with an ESP32 and a built-in battery pack. A piggybacking shield adds 3x NRF24 modules for the 2.4 GHz features and a CC1101 module for the sub-GHz features.</p>
<p>Obviously, functions like jamming and spoofing are highly illegal in most countries, but it is interesting to see the capabilities available to anyone with these cheap chips and the right software. <a href="https://www.rtl-sdr.com/esp32-div-an-esp32-based-swiss-army-knife-for-wireless-networks/" target="_blank" rel="noopener">source</a></p>
<hr />
<h1 class="elementor-heading-title elementor-size-default">ESP32-DIV: Your Swiss Army Knife for Wireless Networks</h1>
<p>I’m Cifer, and after months of anticipation, I’m finally ready to introduce you to the ESP32DIV—an upgraded version of my original project that has been years in the making. If you’re excited about wireless tech, cybersecurity, and open-source hardware, then this is the project for you! Today, I’ll walk you through all the new features and the hardware behind this amazing device.</p>
<h3><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f525.png" alt="🔥" class="wp-smiley" style="height: 1em; max-height: 1em;" /> The ESP32DIV Evolution</h3>
<p>The ESP32DIV project originally started a few years ago. You all loved the first version, but compared to the new iteration, that one was like a “kindergarten project.” The new version is packed with upgrades and is much more powerful. While the old version only supported Wi-Fi and BLE, the ESP32DIV now has support for 2.4GHz and Sub-GHz frequencies, expanding its capabilities beyond what we originally imagined.</p>
<p>You might be wondering about the name—ESP32DIV. The “ESP32” part is obvious, but “DIV” comes from Persian mythology. In Persian culture, div refers to a supernatural being or demon—powerful and often associated with chaos and evil. It’s a fitting name for a tool that disrupts and manipulates wireless signals!</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-21117" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ESP32-DIV-Your-Swiss-Army-Knife-for-Wireless-Networks.jpg" alt="" width="828" height="466" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ESP32-DIV-Your-Swiss-Army-Knife-for-Wireless-Networks.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ESP32-DIV-Your-Swiss-Army-Knife-for-Wireless-Networks-400x225.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ESP32-DIV-Your-Swiss-Army-Knife-for-Wireless-Networks-768x432.jpg 768w" sizes="(max-width: 828px) 100vw, 828px" /></p>
<h3><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f310.png" alt="🌐" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Exploring the Features</h3>
<p>Let’s dive into the features that make the ESP32DIV so special. I’ve split the functionalities into several menus, each offering a unique set of tools for wireless manipulation and analysis.</p>
<h3><strong>Wi-Fi Menu:</strong></h3>
<p><strong>• Packet Monitor:</strong><br />
The Packet Monitor displays live traffic across all 14 Wi-Fi channels, visualized as a waterfall graph. This feature gives you real-time insight into what’s happening in your Wi-Fi environment.</p>
<p><strong>• Beacon Spammer:</strong><br />
This tool sends out fake Wi-Fi access points (beacon frames) to flood the airwaves. You can use it to disrupt connections, confuse nearby devices, or even trick users into connecting to fake networks. It offers two options: one that targets specific access points with custom names, and another that generates random fake networks.</p>
<p><strong>• Deauth Detector:</strong><br />
This feature scans for deauthentication attacks and other suspicious activity. Originally focused on detecting deauth attacks, it has evolved into a more general-purpose threat detection tool.</p>
<p><strong>• Wi-Fi Scanner:</strong><br />
The Wi-Fi Scanner provides a full list of nearby Wi-Fi networks along with detailed information about each one. It’s perfect for network analysis or security assessments.</p>
<p>&nbsp;</p>
<h3><strong>Bluetooth Menu:</strong></h3>
<p><strong>• BLE Jammer:</strong><br />
The BLE Jammer floods Bluetooth Low Energy (BLE) advertising channels with noise, making it harder for devices to discover or connect to each other. It also supports classic Bluetooth channels.</p>
<p><strong>• BLE Spoofer:</strong><br />
The BLE Spoofer mimics real BLE devices by sending fake advertising packets. You can impersonate specific devices and launch spoofing operations to test how other devices respond to fake signals.</p>
<p><strong>• Sour Apple:</strong><br />
Designed for Apple devices, the Sour Apple tool exploits BLE features like AirDrop and Continuity. It spoofs Apple BLE advertisements to trigger unintended behaviors or potentially cause data leaks.</p>
<p><strong>• BLE Scanner:</strong><br />
This tool scans for nearby BLE devices, even those normally hidden from your phone or laptop. You’ll receive detailed information on each device, making it great for analysis or security research.</p>
<h3><strong>2.4GHz Menu:</strong></h3>
<p><strong>• 2.4GHz Scanner:</strong><br />
This scans the entire 2.4GHz spectrum across 128 channels, enabling detection of a variety of wireless protocols—not just Wi-Fi and Bluetooth. It’s especially useful for spotting Zigbee networks or proprietary RF protocols operating in the same frequency range.</p>
<p><strong>• Protokill:</strong><br />
Protokill lets you jam different wireless protocols on the 2.4GHz band, including Zigbee and Wi-Fi. It’s perfect for stress testing protocols and conducting specific jamming operations.</p>
<p><strong>Sub-GHz Menu:</strong><br />
<strong>• </strong>Replay Attack:<br />
Capture a signal (such as a door unlock command) and replay it to gain unauthorized access. This tool allows you to store and replay captured signals, visualized with a real-time waterfall graph to help you better understand the process.</p>
<p><strong>• Sub-GHz Jammer:</strong><br />
This feature disrupts wireless communication in Sub-GHz frequencies, targeting devices like garage door openers, remote controls, and IoT sensors. You can select specific frequencies to jam or let the device automatically cycle through them.</p>
<p><strong>• Saved Profiles:</strong><br />
This section stores all captured signals from the Replay Attack feature, allowing you to revisit them, replay frequencies, or delete profiles as needed.</p>
<h3><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6e0.png" alt="🛠" class="wp-smiley" style="height: 1em; max-height: 1em;" /> The Hardware Behind ESP32DIV</h3>
<p>Now that you’ve seen the features, let’s take a look at the hardware. The ESP32DIV is made of two main sections: the Main Board and the Shield.</p>
<p><strong>Main Board:</strong></p>
<p><strong>• </strong>LF33: A voltage regulator providing a stable 3.3V supply.<br />
<strong>• </strong>TP4056: Lithium battery charger with protection.<br />
<strong>• </strong>CP2102: USB-to-serial converter for flashing and communication.<br />
<strong>• </strong>PCF8574: I/O expander for managing multiple button inputs.<br />
<strong>• </strong>SD Card Slot: For saving captured signals, logs, and configurations.<br />
<strong>• </strong>ESP32-U (16MB version): The core microcontroller with Wi-Fi and BLE.<br />
<strong>• </strong>Antenna Connector: For connecting external antennas.<br />
<strong>• </strong>ILI9341 TFT Display: A 2.8-inch screen for UI and live data.<br />
<strong>• </strong>Push Buttons: For menu navigation.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-21126" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_7956.00_09_14_18.Still013-1536x864-1.jpg" alt="" width="805" height="453" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_7956.00_09_14_18.Still013-1536x864-1.jpg 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_7956.00_09_14_18.Still013-1536x864-1-400x225.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_7956.00_09_14_18.Still013-1536x864-1-1024x576.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_7956.00_09_14_18.Still013-1536x864-1-768x432.jpg 768w" sizes="(max-width: 805px) 100vw, 805px" /></p>
<p>&nbsp;</p>
<p><strong>Shield:</strong><br />
<strong>• </strong>3 x NRF24 Modules: For 2.4GHz operations like jamming and attacks.</p>
<p><strong>• </strong>CC1101 Module: Su</p>
<hr />
<h1 class="elementor-heading-title elementor-size-default">ESP32-DIV: Your Swiss Army Knife for Wireless Networks</h1>
<p><iframe title="Your Swiss Army Knife for Wireless Networks" width="640" height="360" src="https://www.youtube.com/embed/bUvBjcczzcc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>In our increasingly connected world, where Wi-Fi networks are the backbone of our digital lives, there’s a growing need for tools that can help us understand, troubleshoot, and secure these networks. Imagine having a device that can not only monitor network traffic but also scan for nearby Wi-Fi networks, simulate beacon frames, and detect deauthentication attacks. Sounds intriguing, right? Well, you’re in luck because we’ve built just the gadget for you.</p>
<p><iframe title="&#x1f510; Sub-GHz Replay Attack in action with ESP32-DIV #cybersecurity #esp32 #gadgets" width="640" height="360" src="https://www.youtube.com/embed/jjO6Zj0ANJY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h3><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f31f.png" alt="🌟" class="wp-smiley" style="height: 1em; max-height: 1em;" /> About the Project</h3>
<p>Our creation is a versatile gadget that combines the power of the ESP32 microcontroller, the visual appeal of an ST7735 TFT LCD screen, and the convenience of microswitches for easy navigation. This multifaceted device is designed to assist network administrators, security enthusiasts, and IoT developers in understanding and managing wireless networks.</p>
<p>Let’s dive deeper into the features, the technology, and the journey of building this remarkable gadget.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-21119" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMG_2684-1024x683-1.jpg" alt="" width="820" height="547" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMG_2684-1024x683-1.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMG_2684-1024x683-1-400x267.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMG_2684-1024x683-1-768x512.jpg 768w" sizes="(max-width: 820px) 100vw, 820px" /></p>
<h3><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f3af.png" alt="🎯" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Features</h3>
<p>Our ESP32-based gadget boasts four main features, each catering to a specific aspect of wireless network management:</p>
<p><strong>• Packet Monitor</strong><br />
The Packet Monitor function allows you to capture and analyze network traffic in real-time. Whether you’re troubleshooting network issues or simply curious about the data flowing through the airwaves, this feature provides valuable insights.</p>
<p><strong>• Wi-Fi Analyzer</strong><br />
With the Wi-Fi Analyzer, you can scan the vicinity for available Wi-Fi networks. Discover SSIDs, signal strengths, and security protocols, all at the press of a button. It’s an indispensable tool for finding the best Wi-Fi connection.</p>
<p><strong>• Beacon Spam</strong><br />
Beacon Spamming is both intriguing and educational. It involves simulating beacon frames to broadcast information about a non-existent network. While not for malicious purposes, this function sheds light on the inner workings of Wi-Fi networks.</p>
<p><strong>• Deauth Detector</strong><br />
Network security is paramount, and the Deauth Detector function ensures you stay vigilant. It monitors for deauthentication packets, often a sign of an unauthorized intrusion. When detected, the gadget alerts you with both visual and audible cues.</p>
<p>Now that you’re familiar with what our gadget can do let’s get into the nitty-gritty of creating your very own wireless network Swiss Army knife.</p>
<h3><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f9f0.png" alt="🧰" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Getting Started</h3>
<p><strong>• TFT LCD ST7735</strong><br />
The ST7735 TFT LCD is the visual gateway to your gadget’s capabilities. Its vibrant display provides real-time feedback and enables user interaction. With a resolution of X by Y, it ensures that information is presented clearly and intuitively.</p>
<p><strong>• ESP32 Microcontroller</strong><br />
The ESP32 microcontroller is the brains behind the operation. Its built-in Wi-Fi and Bluetooth capabilities make it the ideal choice for this project. It handles the various functions, communicates with the TFT LCD, and manages user input through micro switches.</p>
<p><strong>• Micro Switches</strong><br />
Navigation is made easy thanks to the inclusion of micro switches. These tactile buttons allow users to move through menus, select functions, and interact with the gadget effortlessly.</p>
<h3 dir="auto" tabindex="-1"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f50c.png" alt="🔌" class="wp-smiley" style="height: 1em; max-height: 1em;" />Schematic</h3>
<p dir="auto" tabindex="-1">Before you begin assembling your gadget, it’s essential to understand the connections between the components. The table below outlines the connections between the ESP32, ST7735 TFT LCD, and micro switches:</p>
<p><strong>• ESP32 / st7735 TFT LCD</strong></p>
<table>
<thead>
<tr>
<th>Pin Name</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>14</td>
<td>CS</td>
</tr>
<tr>
<td>33</td>
<td>RST</td>
</tr>
<tr>
<td>27</td>
<td>DC</td>
</tr>
<tr>
<td>18</td>
<td>CLK</td>
</tr>
<tr>
<td>23</td>
<td>DIN</td>
</tr>
<tr>
<td>5V</td>
<td>VCC</td>
</tr>
<tr>
<td>3V3</td>
<td>LED</td>
</tr>
<tr>
<td>GND</td>
<td>GND</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p><strong>• ESP32 / Micro Switch</strong></p>
<table>
<thead>
<tr>
<th>Name</th>
<th>GPIO Pin</th>
</tr>
</thead>
<tbody>
<tr>
<td>Select</td>
<td>25</td>
</tr>
<tr>
<td>Up</td>
<td>21</td>
</tr>
<tr>
<td>Down</td>
<td>22</td>
</tr>
<tr>
<td>Back</td>
<td>26</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<h3 id="user-content-dart-features" dir="auto" tabindex="-1"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f3af.png" alt="🎯" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Core Functions</h3>
<p dir="auto" tabindex="-1">Now, let’s delve into the core functions of your gadget:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-21120" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274908_y-768x928-1.jpg" alt="" width="462" height="558" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274908_y-768x928-1.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274908_y-768x928-1-331x400.jpg 331w" sizes="(max-width: 462px) 100vw, 462px" /></p>
<p>&nbsp;</p>
<p><strong>• Packet Monitoring</strong><br />
the packet monitor allows you to receive the packets and surveillance the specific chosen channel. The Packet Monitoring function leverages the ESP32’s Wi-Fi capabilities to capture and analyze wireless packets. in promiscuous mode, enabling it to monitor all nearby Wi-Fi traffic. The information gathered is then displayed on the TFT LCD screen in real time.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-21122" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274909_y-739x1024-1.jpg" alt="" width="438" height="607" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274909_y-739x1024-1.jpg 739w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274909_y-739x1024-1-289x400.jpg 289w" sizes="(max-width: 438px) 100vw, 438px" /></p>
<p><strong>• Wi-Fi Scanning</strong><br />
The Wi-Fi Scanning function detects and lists nearby access points. You’ll utilize the ESP32’s scanning functions to retrieve information about SSIDs, signal strengths, channels and security protocols. This valuable data is presented to the user for network selection.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-21123" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5260253284902489871_y-768x947-1.jpg" alt="" width="458" height="565" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5260253284902489871_y-768x947-1.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5260253284902489871_y-768x947-1-324x400.jpg 324w" sizes="(max-width: 458px) 100vw, 458px" /></p>
<p><strong>• Beacon Spamming</strong><br />
in this section, by choosing the desired channel you can create and spam fake Wi-Fi access points. Beacon Spamming involves crafting and broadcasting fake beacon frames. This function is for educational purposes, allowing users to understand how networks announce their presence.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-21124" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274910_y-768x990-1.jpg" alt="" width="479" height="617" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274910_y-768x990-1.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274910_y-768x990-1-310x400.jpg 310w" sizes="(max-width: 479px) 100vw, 479px" /></p>
<p><strong>• Deauth Detection</strong><br />
Implement de-authentication detection by monitoring the network for deauth packets. all channels will be scanned for any de-authentication attack and will display the amount of detected packets for every channel. When detected, trigger the buzzer and LED to alert the user.</p>
<h2 dir="auto" tabindex="-1"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f440.png" alt="👀" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Use Cases</h2>
<p>Explore practical use cases for your gadget:</p>
<p><strong>Network Troubleshooting</strong>: Use the packet monitoring and Wi-Fi scanning functions to troubleshoot network issues, identify interference, and optimize Wi-Fi performance.</p>
<p><strong>Ethical Hacking Practice</strong>: Beacon spamming and deauth detection can be used for educational purposes in learning about network security and ethical hacking techniques.</p>
<p><strong>Security Audits</strong>: Offer your gadget as a tool for security professionals to perform security audits on wireless networks.</p>
<p><strong>IoT Projects</strong>: Extend the capabilities of your gadget by integrating it into IoT projects where wireless network monitoring is essential.</p>
<p><img loading="lazy" decoding="async" class="alignleft wp-image-5427" src="https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-150x150.png" sizes="(max-width: 30px) 100vw, 30px" srcset="https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-150x150.png 150w, https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-300x300.png 300w, https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-1022x1024.png 1022w, https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-768x770.png 768w, https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-1532x1536.png 1532w, https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-2043x2048.png 2043w, https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-500x500.png 500w, https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-750x750.png 750w" alt="" width="30" height="30" /></p>
<h2 dir="auto">Code</h2>
<p>If you’re interested in building this project on your own, the code is available on GitHub. Simply go to the GitHub repository, and download the code.</p>
<p><strong>GitHub repository</strong>: <a href="https://github.com/cifertech/ESP32-DIV">github.com/cifertech/ESP32-DIV</a></p>
<h2><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f64c.png" alt="🙌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Special Thanks to Our Sponsor: PCBWay</h2>
<p>No project is complete without the right tools and materials. That’s where our sponsor, <strong>PCBWay</strong>, stepped in to provide essential support for this project. PCBWay is a leading provider of high-quality printed circuit boards (PCBs) and PCB assembly services.</p>
<p><strong>Website</strong>: <a href="https://www.pcbway.com/" target="_new" rel="noopener">PCBWay Official Website</a></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21125" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_2629.MP4.00_00_01_17.Still001-1024x576-1.jpg" alt="" width="1024" height="576" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_2629.MP4.00_00_01_17.Still001-1024x576-1.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_2629.MP4.00_00_01_17.Still001-1024x576-1-400x225.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_2629.MP4.00_00_01_17.Still001-1024x576-1-768x432.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<h2 id="user-content-star2-about-the-project" dir="auto" tabindex="-1"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f31f.png" alt="🌟" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Conclusion</h2>
<p>In this blog, we embarked on an exciting journey to create a multifunctional gadget using the ESP32 microcontroller, a TFT LCD, and various other components. We explored the hardware components, designed a custom PCB, programmed the device to perform packet monitoring, Wi-Fi scanning, beacon spamming, and deauth detection, and discussed practical use cases.</p>
<p>The world of wireless network monitoring and security is vast, and our gadget can be a valuable tool for enthusiasts, professionals, and learners alike. By understanding the core functions and use cases, you’re well-equipped to build, use, and expand upon this versatile ESP32-based device.</p>
<p>As technology continues to evolve, having the ability to create custom gadgets that address specific needs becomes increasingly valuable. Whether you’re a tinkerer, a student, or a professional, the skills and knowledge gained from this project open doors to countless possibilities in the world of IoT and network security.</p>
<p>So, what’s next for your ESP32 gadget? Will you explore more functions, enhance the user interface, or find new and innovative ways to apply it in your projects? The choice is yours, and the journey is bound to be exciting and rewarding.<a href="https://cifertech.net/esp32-div-your-swiss-army-knife-for-wireless-networks/" target="_blank" rel="noopener">source</a></p>
<hr />
<h1 class="hckui__typography__h1">ESP32-DIV: Your Swiss Army Knife for Wireless Networks</h1>
<p class="hckui__typography__bodyL hckui__layout__marginBottom15">Imagine having a device that can not only monitor network traffic but also scan for nearby Wi-Fi networks, simulate beacon frames, and</p>
<p><iframe title="ESP32-DIV Deauther &#x1f4e1; #esp32 #gadgets #cybersecurity" width="640" height="360" src="https://www.youtube.com/embed/fTTjPQxpWMk?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<div class="markdown-heading"></div>
<blockquote class="instagram-media" style="background: #FFF; border: 0; border-radius: 3px; box-shadow: 0 0 1px 0 rgba(0,0,0,0.5),0 1px 10px 0 rgba(0,0,0,0.15); margin: 1px; max-width: 540px; min-width: 326px; padding: 0; width: calc(100% - 2px);" data-instgrm-captioned="" data-instgrm-permalink="https://www.instagram.com/reel/DI83DcJu6XR/?utm_source=ig_embed&amp;utm_campaign=loading" data-instgrm-version="14">
<div style="padding: 16px;">
<p>&nbsp;</p>
<div style="display: flex; flex-direction: row; align-items: center;">
<div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 40px; margin-right: 14px; width: 40px;"></div>
<div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center;">
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 100px;"></div>
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 60px;"></div>
</div>
</div>
<div style="padding: 19% 0;"></div>
<div style="display: block; height: 50px; margin: 0 auto 12px; width: 50px;"></div>
<div style="padding-top: 8px;">
<div style="color: #3897f0; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: 550; line-height: 18px;">View this post on Instagram</div>
</div>
<div style="padding: 12.5% 0;"></div>
<div style="display: flex; flex-direction: row; margin-bottom: 14px; align-items: center;">
<div>
<div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(0px) translateY(7px);"></div>
<div style="background-color: #f4f4f4; height: 12.5px; transform: rotate(-45deg) translateX(3px) translateY(1px); width: 12.5px; flex-grow: 0; margin-right: 14px; margin-left: 2px;"></div>
<div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(9px) translateY(-18px);"></div>
</div>
<div style="margin-left: 8px;">
<div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 20px; width: 20px;"></div>
<div style="width: 0; height: 0; border-top: 2px solid transparent; border-left: 6px solid #f4f4f4; border-bottom: 2px solid transparent; transform: translateX(16px) translateY(-4px) rotate(30deg);"></div>
</div>
<div style="margin-left: auto;">
<div style="width: 0px; border-top: 8px solid #F4F4F4; border-right: 8px solid transparent; transform: translateY(16px);"></div>
<div style="background-color: #f4f4f4; flex-grow: 0; height: 12px; width: 16px; transform: translateY(-4px);"></div>
<div style="width: 0; height: 0; border-top: 8px solid #F4F4F4; border-left: 8px solid transparent; transform: translateY(-4px) translateX(8px);"></div>
</div>
</div>
<div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center; margin-bottom: 24px;">
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 224px;"></div>
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 144px;"></div>
</div>
<p>&nbsp;</p>
<p style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; line-height: 17px; margin-bottom: 0; margin-top: 8px; overflow: hidden; padding: 8px 0 7px; text-align: center; text-overflow: ellipsis; white-space: nowrap;"><a style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: normal; line-height: 17px; text-decoration: none;" href="https://www.instagram.com/reel/DI83DcJu6XR/?utm_source=ig_embed&amp;utm_campaign=loading" target="_blank" rel="noopener">A post shared by Cifer (@cifertech)</a></p>
</div>
</blockquote>
<p><script async src="//www.instagram.com/embed.js"></script></p>
<blockquote class="instagram-media" style="background: #FFF; border: 0; border-radius: 3px; box-shadow: 0 0 1px 0 rgba(0,0,0,0.5),0 1px 10px 0 rgba(0,0,0,0.15); margin: 1px; max-width: 540px; min-width: 326px; padding: 0; width: calc(100% - 2px);" data-instgrm-captioned="" data-instgrm-permalink="https://www.instagram.com/reel/DJj6SwHuBzN/?utm_source=ig_embed&amp;utm_campaign=loading" data-instgrm-version="14">
<div style="padding: 16px;">
<p>&nbsp;</p>
<div style="display: flex; flex-direction: row; align-items: center;">
<div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 40px; margin-right: 14px; width: 40px;"></div>
<div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center;">
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 100px;"></div>
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 60px;"></div>
</div>
</div>
<div style="padding: 19% 0;"></div>
<div style="display: block; height: 50px; margin: 0 auto 12px; width: 50px;"></div>
<div style="padding-top: 8px;">
<div style="color: #3897f0; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: 550; line-height: 18px;">View this post on Instagram</div>
</div>
<div style="padding: 12.5% 0;"></div>
<div style="display: flex; flex-direction: row; margin-bottom: 14px; align-items: center;">
<div>
<div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(0px) translateY(7px);"></div>
<div style="background-color: #f4f4f4; height: 12.5px; transform: rotate(-45deg) translateX(3px) translateY(1px); width: 12.5px; flex-grow: 0; margin-right: 14px; margin-left: 2px;"></div>
<div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(9px) translateY(-18px);"></div>
</div>
<div style="margin-left: 8px;">
<div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 20px; width: 20px;"></div>
<div style="width: 0; height: 0; border-top: 2px solid transparent; border-left: 6px solid #f4f4f4; border-bottom: 2px solid transparent; transform: translateX(16px) translateY(-4px) rotate(30deg);"></div>
</div>
<div style="margin-left: auto;">
<div style="width: 0px; border-top: 8px solid #F4F4F4; border-right: 8px solid transparent; transform: translateY(16px);"></div>
<div style="background-color: #f4f4f4; flex-grow: 0; height: 12px; width: 16px; transform: translateY(-4px);"></div>
<div style="width: 0; height: 0; border-top: 8px solid #F4F4F4; border-left: 8px solid transparent; transform: translateY(-4px) translateX(8px);"></div>
</div>
</div>
<div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center; margin-bottom: 24px;">
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 224px;"></div>
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 144px;"></div>
</div>
<p>&nbsp;</p>
<p style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; line-height: 17px; margin-bottom: 0; margin-top: 8px; overflow: hidden; padding: 8px 0 7px; text-align: center; text-overflow: ellipsis; white-space: nowrap;"><a style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: normal; line-height: 17px; text-decoration: none;" href="https://www.instagram.com/reel/DJj6SwHuBzN/?utm_source=ig_embed&amp;utm_campaign=loading" target="_blank" rel="noopener">A post shared by Cifer (@cifertech)</a></p>
</div>
</blockquote>
<p><script async src="//www.instagram.com/embed.js"></script></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is a Wi-Fi Pineapple? How to Protect Yourself From Pineapple Attacks</title>
		<link>https://goodshepherdmedia.net/what-is-a-wi-fi-pineapple-how-to-protect-yourself-from-pineapple-attacks/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 14 Jul 2025 21:00:06 +0000</pubDate>
				<category><![CDATA[Computer Hacks]]></category>
		<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[how to defend from WiFi Pineapple]]></category>
		<category><![CDATA[how to protect your wifi]]></category>
		<category><![CDATA[How to Protect Yourself From Pineapple Attacks]]></category>
		<category><![CDATA[how to secure your wireless network]]></category>
		<category><![CDATA[how to stop a hacker]]></category>
		<category><![CDATA[Wi-Fi Pineapple]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21143</guid>

					<description><![CDATA[What is a Wi-Fi Pineapple? How to Protect Yourself From Pineapple Attacks Wi-Fi Pineapples trick you into connecting to fake networks, in an attempt to compromise your security and data. Protect yourself by avoiding public Wi-Fi, using VPNs, and watching for suspicious activity. Businesses should invest in secure Wi-Fi hardware, monitor their networks for unknown [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="article-header-title">What is a Wi-Fi Pineapple? How to Protect Yourself From Pineapple Attacks</h1>
<p><iframe title="How to Defend Against WiFi Attacks and WiFi Pineapples" width="640" height="360" src="https://www.youtube.com/embed/ZXuXIFeYdP4?list=PLW5y1tjAOzI2iSdHIGrOeb1-bNWB7TKMI" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<section class="emaki-custom-block emaki-custom-key-points" data-nosnippet="">
<div id="custom_block_0" class="emaki-custom key-points">
<div class="custom_block-content key-points">
<ul>
<li>Wi-Fi Pineapples trick you into connecting to fake networks, in an attempt to compromise your security and data.</li>
<li>Protect yourself by avoiding public Wi-Fi, using VPNs, and watching for suspicious activity.</li>
<li>Businesses should invest in secure Wi-Fi hardware, monitor their networks for unknown devices, and pay attention to what their IT department says.</li>
</ul>
</div>
</div>
</section>
<p>&#8220;Wi-Fi Pineapple&#8221; is a silly name for a real threat to your cybersecurity. These devices trick you into connecting to fake Wi-Fi networks to intercept data and compromise your privacy. Here&#8217;s how to protect against Pineapples and Wi-Fi attacks.</p>
<h2 id="what-is-a-wi-fi-pineapple">What Is a Wi-Fi Pineapple?</h2>
<p>A Wi-Fi Pineapple is a device ostensibly sold for Wi-Fi security auditing, that can also be used to perform real attacks on your devices.</p>
<p class="adsninja-injected-repeatable-ad-afterend">It&#8217;s not literally a pineapple (though I&#8217;m sure some enterprising hacker out there has at least attempted to house a Raspberry Pi in an actual pineapple fruit), but named because early devices resembled pineapples, with antennas sticking out at all angles much like pineapple leaves.</p>
<p>&#8220;Wi-Fi Pineapple&#8221; referred to a specific commercial device that automates man-in-the-middle attacks, but these attacks can also be performed with readily available off-the-shelf hardware, including laptops and single board computers.</p>
<div class="body-img landscape ">
<div class="responsive-img image-expandable img-article-item" data-img-url="https://static1.howtogeekimages.com/wordpress/wp-content/uploads/2025/05/52675364250_f1a7116783_o.jpg" data-modal-id="single-image-modal" data-modal-container-id="single-image-modal-container" data-img-caption="&quot;Corbin Davenport \/ How-To Geek&lt;br \/&gt;\n&lt;br \/&gt;\n&amp;nbsp;&quot;">
<figure><img loading="lazy" decoding="async" class="alignnone wp-image-21146" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/52675364250_f1a7116783_o.avif" alt="" width="524" height="294" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/52675364250_f1a7116783_o.avif 1650w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/52675364250_f1a7116783_o-400x224.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/52675364250_f1a7116783_o-1024x575.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/52675364250_f1a7116783_o-768x431.avif 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/52675364250_f1a7116783_o-1536x862.avif 1536w" sizes="(max-width: 524px) 100vw, 524px" /><figcaption class="body-img-caption"></figcaption>How Do Wi-Fi Attacks Work?</figure>
</div>
</div>
<p>There are two main types of attacks that use Wi-Fi networks: &#8220;evil twin&#8221; attacks impersonate known Wi-Fi networks, and trick your device into connecting to them, intercepting data and potentially giving remote access to your device. &#8220;Rogue AP (access point)&#8221; attacks advertise open networks in the hope that naive or internet-desperate users will connect, with the same outcomes.</p>
<p>Malicious Wi-Fi hotspots are set up in coffee shops, airports, and hotels in an attempt to get you to connect without any technical trickery. Often, simply naming the network something legitimate-sounding (like the name of the hotel) is enough to fool people into thinking it&#8217;s the real deal.</p>
<div class="body-img landscape ">
<div class="responsive-img image-expandable img-article-item" data-img-url="https://static1.howtogeekimages.com/wordpress/wp-content/uploads/2022/11/Joe-at-coffee-shop.jpg" data-modal-id="single-image-modal" data-modal-container-id="single-image-modal-container" data-img-caption="&quot;&lt;em&gt;Joe Fedewa \/ How-To Geek&lt;\/em&gt;&quot;">
<figure><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21145" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Joe-at-coffee-shop.avif" alt="" width="650" height="365" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Joe-at-coffee-shop.avif 650w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/Joe-at-coffee-shop-400x225.avif 400w" sizes="(max-width: 650px) 100vw, 650px" /></p>
<p class="adsninja-injected-repeatable-ad-beforebegin">For individuals, the primary threat of joining a malicious Wi-Fi network is the interception and recording of the data that is transmitted: emails, social network logins, and other sensitive information (including what websites you visit) can be recorded, and even if encrypted, there&#8217;s still the possibility that they can be exploited. Devices with improperly configured firewalls may also be remotely accessed via a compromised network, putting all the data on your device at risk.</p>
<p>For businesses, there is an additional threat: Wi-Fi Pineapples and other malicious devices can be inserted into networks (either using an unguarded Ethernet socket, or by capturing legitimate Wi-Fi credentials and cracking them), granting the attacker unfettered access to internal company infrastructure.</p>
<div class="ad-even"></div>
<h2 id="how-to-protect-yourself-from-pineapples">How To Protect Yourself From Pineapples</h2>
<p>The best way to protect yourself from a pineapple is to stay out of its way. Avoid public Wi-Fi if you can by tethering to your mobile phone to get online. If you do have to use public Wi-Fi, use a reputable VPN and set it up so that all internet traffic must go through it (known as a &#8220;kill switch&#8221; in some VPN interfaces). Travel routers are also great for this, allowing you to tether multiple devices or put multiple devices behind a VPN.</p>
<p class="adsninja-injected-repeatable-ad-beforebegin">While an actual Wi-Fi Pineapple device may be difficult to detect, there are additional measures you can take to protect yourself from fake hotspots and man-in-the-middle attacks in general. Before you connect to a network, check for duplicates or suspicious network names, and avoid scanning QR codes to connect unless they&#8217;re in a position they&#8217;re unlikely to have been tampered with. You can also disable auto-connect for public networks you&#8217;ve joined previously so that you don&#8217;t mistakenly reconnect to an impostor.</p>
<p>At home, make sure you change the default Wi-Fi network and administrator passwords and set up a guest network for visitors to use. A separate IoT network for your &#8220;smart&#8221; devices can also prevent them becoming a vector for network intruders. If you notice similar network names appearing in your neighborhood, consider changing the name of your own network so you don&#8217;t accidentally connect to someone else&#8217;s.</p>
<div id="b56b-4e7d-b914f2043dfd" class="display-card article article-card small no-badge active-content " data-include-community-rating="false" data-nosnippet="">
<div class="w-img ">
<div class="body-img landscape ">
<div class="responsive-img img-featured-4-pin-single-size-featured-secondary" data-img-url="https://static1.howtogeekimages.com/wordpress/wp-content/uploads/2024/06/a-phone-on-the-bluetooth-pairing-screen-and-the-bluetooth-icon-in-the-center.jpg" data-modal-id="single-image-modal" data-modal-container-id="single-image-modal-container" data-img-caption="&quot;&quot;">
<figure><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21144" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/a-phone-on-the-bluetooth-pairing-screen-and-the-bluetooth-icon-in-the-center.avif" alt="" width="844" height="536" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/a-phone-on-the-bluetooth-pairing-screen-and-the-bluetooth-icon-in-the-center.avif 844w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a-phone-on-the-bluetooth-pairing-screen-and-the-bluetooth-icon-in-the-center-400x254.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a-phone-on-the-bluetooth-pairing-screen-and-the-bluetooth-icon-in-the-center-768x488.avif 768w" sizes="(max-width: 844px) 100vw, 844px" /></figure>
</div>
</div>
</div>
</div>
</figure>
</div>
</div>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Generally, you should always heed SSL certificate warnings and unexpected redirects that may indicate your connection has been compromised. Never log into a website or app if you see one of these warnings. If you&#8217;re on public Wi-Fi, disconnect, and if you&#8217;re at home, start taking steps to diagnose and fix the issue(or call your local tech support). If a website login screen looks different to what you&#8217;re used to, you should also be suspicious that your traffic may be being re-routed to a fake site intended to steal your details.</p>
<h2 id="how-businesses-can-prevent-pineapple-attacks" class="adsninja-injected-repeatable-ad-beforebegin">How Businesses Can Prevent Pineapple Attacks</h2>
<p>If you run a business that provides Wi-Fi to staff or the public, it&#8217;s your responsibility to keep it secure. Give your IT team the time and resources they need to deploy, secure, and maintain infrastructure properly, or risk it falling out of date and being vulnerable to new attacks.</p>
<p>Your network should be regularly scanned for unauthorized devices and rogue Wi-Fi networks that may have been set up to trap employees or customers. If something suspicious is found, hunt down the rogue device (it might be hiding in a dusty corner under a couch in a café, for example) and remove it. Use enterprise-grade Wi-Fi hardware like Unifi that provides client isolation, management tools, and additional security features to make sure your network is under your control.</p>
<div class="ad-even"></div>
<h2 id="tips-for-staying-safe-in-a-dangerous-digital-world">Tips for Staying Safe in a Dangerous Digital World</h2>
<p>Antivirus and personal firewalls also play a key part in staying safe when connecting to public networks. If your device is compromised, they can help detect and block malicious software and activity so that you can secure your accounts and get your device fixed.</p>
<p>There&#8217;s also a laundry list of security tips and best practices you should follow to help prevent yourself becoming a victim of cybercrime. Following security advice can be inconvenient (especially when you really need to get online and you&#8217;re out of phone reception), but it&#8217;s worth it in the long run. <a href="https://www.howtogeek.com/what-is-a-wi-fi-pineapple-how-to-protect-yourself-from-pineapple-attacks/" target="_blank" rel="noopener">source</a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
