Those who fancy themselves as infrastructure nerds find cell sites fascinating. They’re outposts of infrastructure wedged into almost any place that can provide enough elevation to cover whatever gap might exist in a carrier’s coverage map. But they’re usually locked behind imposing doors and fences with signs warning of serious penalty for unauthorized access, and so we usually have to settle for admiring them from afar.
Some folks, like [Mike Fisher] aka [MrMobile], have connections, though, and get to take an up close and personal tour of a couple of cell sites. And while the video below is far from detailed enough to truly satisfy most of the Hackaday crowd, it’s enough to whet the appetite and show off a little of what goes into building out a modern cell site. [Mike] somehow got AT&T to take him up to a cell site mounted in the belfry and steeple of the 178-year old Unitarian Church in Duxbury, Massachusetts. He got to poke around everything from the equipment shack with its fiber backhaul gear and backup power supplies to the fiberglass radome shaped to look like the original steeple that now houses the antennas.
Next he drove up to Mount Washington in New Hampshire, the highest point in the northeast US and home to a lot of wireless infrastructure. Known for having some of the worst weather in the world and with a recent low of -36°F (-38°C) to prove it, Mount Washington is brutal on infrastructure, to which the tattered condition of the microwave backhaul radomes attests.
We appreciate the effort that went into this video, but again, [Mike] leaves us wanting more details. Luckily, we’ve got an article that does just that.
Continue reading “Behind the Scenes at a Pair of Cell Sites”
This is more than a printing filament hack — closer to bleeding edge bio-engineering — but we can’t help but be fascinated by the prospect of 3D printing with filament that’s alive on a cellular level.
The team from MIT led by [Xuanhe Zhao] and [Timothy Lu] have programmed bacteria cells to respond to specific compounds. To demonstrate, they printed a temporary tattoo of a tree formed of the sturdy bacteria and a hydrogel ‘ink’ loaded with nutrients, that lights up over a few hours when adhered to skin swabbed with these specific stimuli.
So far, the team has been able to produce objects as large as several centimetres, capable of being adapted into active materials when printed and integrated as wearables, displays, sensors and more.
Continue reading “Living 3D Printer Filament”
Cell phone towers are something we miss when we’re out of range, but imagine how we’d miss them if they had been destroyed by disastrous weather. In such emergencies it is more important than ever to call loved ones, and tell them we’re safe. [Matthew May] and [Brendan Harlow] aimed to make their own secure and open-source cellular network antenna for those occasions. It currently supports calling between connected phones, text messaging, and if the base station has a hard-wired internet connection, users can get online.
This was a senior project for a security class, and it seems that the bulk of their work was in following the best practices set by the Center for Internet Security. They adopted a model intended for the Debian 8 operating system which wasn’t a perfect fit. According to Motherboard their work scored an A+, and we agree with the professors on this one.
Last year, the same SDR board, the bladeRF, was featured in a GSM tower hack with a more sinister edge, and of course Hackaday is rife with SDR projects.
Thank you [Alfredo Garza] for the tip.
While batteries are cheap and readily obtainable today, sometimes it’s still fun to mess around with their less-common manifestations. Experimenting with a few configurations, Hackaday.io user [will.stevens] has assembled an aluminium-air battery and combined it with a joule thief to light an LED.
To build the air battery, soak an activated charcoal puck — from a water filter, for example — in salt-saturated water while you cut the base off an aluminium can. A circle of tissue paper — also saturated with the salt water — is pressed between the bare charcoal disk and the can, taking care not to rip the paper, and topped off with a penny and a bit of wire. Once clamped together, the reaction is able to power an LED via a simple joule thief.
Continue reading “Stealing Joules From An Aluminium-Air Battery”
In May of 2000, then-President Bill Clinton signed a directive that would improve the accuracy of GPS for anyone. Before this switch was flipped, this ability was only available to the military. What followed was an onslaught of GPS devices most noticeable in everyday navigation systems. The large amount of new devices on the market also drove the price down to the point where almost anyone can build their own GPS tracking device from scratch.
The GPS tracker that [Vadim] created makes use not just of GPS, but of the GSM network as well. He uses a Neoway M590 GSM module for access to the cellular network and a NEO-6 GPS module. The cell network is used to send SMS messages that detail the location of the unit itself. Everything is controlled with an ATmega328P, and a lithium-ion battery and some capacitors round out the fully integrated build.
[Vadim] goes into great detail about how all of the modules operate, and has step-by-step instructions on their use that go beyond what one would typically find in a mundane datasheet. The pairing of the GSM and GPS modules seems to go match up well together, much like we have seen GPS and APRS pair for a similar purpose: tracking weather balloons.
The eternal enemy of [James Puderer]’s pockets is anything that isn’t his smartphone. When the apartment building he resides in added a garage door, the forces of evil gained another ally in the form of a garage door opener. So, he dealt with the insult by rigging up a Raspberry Pi to act as a relay between the opener and his phone.
The crux of the setup is Firebase Cloud Messaging (FCM) — a Google service that allows messages to be sent to devices that generally have dynamic IP addresses, as well as the capacity to send messages upstream, in this case from [Puderer]’s cell phone to his Raspberry Pi. After whipping up an app — functionally a button widget — that sends the command to open the door over FCM, he set up the Pi in a storage locker near the garage door and was able to fish a cable with both ethernet and power to it. A script running on the Pi triggers the garage door opener when it receives the FCM message and — presto — open sesame.
Continue reading “Open Your Garage Door With Your Smartphone”
If you look around the street furniture of your city, you may notice some ingenious attempts to disguise cell towers. There are fake trees, lamp posts with bulges, and plenty you won’t even be aware of concealed within commercial signage. The same people who are often the first to complain when they have no signal it seems do not want to be reminded how that signal reaches them. On a more sinister note, government agencies have been known to make use of fake cell towers of a different kind, those which impersonate legitimate towers in order to track and intercept communications.
In investigating the phenomenon of fake cells, [Julian Oliver] has brought together both strands by creating a fake cell tower hidden within an innocuous office printer. It catches the phones it finds within its range, and sends them a series of text messages that appear to be from someone the phone’s owner might know. It then prints out a transcript of the resulting text conversation along with all the identifying information it can harvest from the phone. As a prank it also periodically calls phones connected to it and plays them the Stevie Wonder classic I Just Called To Say I Love You.
In hardware terms the printer has been fitted with a Raspberry Pi 3, a BladeRF software-defined transceiver, and a pair of omnidirectional antennas which are concealed behind the toner cartridge hatch. Software comes via YateBTS, and [Julian] provides a significant amount of information about its configuration as well as a set of compiled binaries.
In one sense this project is a fun prank, yet on the other hand it demonstrates how accessible the technology now is to impersonate a cell tower and hijack passing phones. We’re afraid to speculate though as to the length of custodial sentence you might receive were you to be caught using one as a private individual.
We’ve considered the Stingray cell phone trackers before here at Hackaday, as well as looking at a couple of possible counter-measures. An app that uses a database of known towers to spot fakes, as well as a solution that relies on an SDR receiver to gather cell tower data from a neighbourhood.
[via Hacker News]