https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/footer-logo.png
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Architecture
  • Engineering/Development
  • Security
ioti.com

Smart Environments


Dennis Siegel

Armed with a custom collar, this cat is a mobile hotspot.

MacGyver-Like Approach to Free City WiFi Uses Cats

German university student Dennis Siegel had the Robin Hood-esque idea of using a cat to break into WiFi networks with poor security and then giving anyone nearby free access to it.
  • Written by Brian Buntz
  • 19th April 2016

Imagine a cat as a parasitic mobile hotspot, breaking into insecure WiFi networks, amplifying the signal, and broadcasting it from a unique collar that includes a Raspberry Pi board, WiFi dongle, and a power bank.  

Siegel, a student at the University of the Arts Bremen, came up with the idea for such a project when enrolled in a class last summer. He says that while the project is “playful and slightly ironic,” it addresses serious Germany’s “outdated privacy, Internet, and copyright policy.” Under a German law known as Störehaftung, WiFi providers can be liable for copyright infringement if someone else downloads questionable material while logged into their network. As a result, Germany lags far behind its neighbors and the United States when it comes to WiFi access.

The Cat Exploit project not only highlights and exploits weaknesses in digital infrastructure as well but also demands free WiFi in cities, Siegel says. Although he says it “definitely fits in” with the IoT, the intent of the project was more critical than pragmatic.

When asked if the technology might have practical applications, Siegel jokes that it might be used to involve pets in drug trafficking. “Theoretically one could also attach a small box [to the cat’s collar] that pops up to drop its content at specific locations or after receiving a digital payment,” Siegel says. “I was also considering this approach but found it a bit too much and not in my original intention. Would have been fun to try this though.”

It is fitting that the class Siegel for which he designed the project is named “Hacks and Hoaxes.” While enrolled in the class last year, Siegel says in an email that his “approach was to achieve something parasitic or symbiotic that (ab)uses animals living in the urban area.” “There are plenty of animals living with and around us unnoticed, being able to enter hidden and closed-off areas. I wanted to use this huge advantage and have others benefit from it. Since I found out about hackable WiFi infrastructure in a prior project, it was just obvious to combine these things.”

Siegel had come up with a sketch for the idea after hearing about a device called the Crow Box, a vending machine designed for crows. “I really like the idea of training animals for something useful while both parties benefit from,” Siegel says. “As Crow Box demonstrates there is a great potential for animals in urban areas to be integrated into city life.”

He was also inspired by a 2014 Def Con talk from security researcher Gene Bransfield titled “How To Weaponize Your Pets.” Bransfield had a similar idea about using cats to hack WiFi and created a custom collar for the task he called “WarKitteh” that was featured in Wired.

Siegel rigged up a harness for his project made of thin Vivak acrylic. Along with the Raspberry Pi board, a power bank, and other hardware, the entire harness weighed roughly 250 grams.

He chose Pi because of its relatively small form factor and the fact that it can support wardriving software and run the appropriate scripts. “I’d have preferred the Pi Zero, but it is quite impossible to get one in Europe,” he says.

Once he had the harness rigged up, he tested it on a colleague’s Maine coon cat named Cosmo.

Cosmo’s collar succeeded in identifying WiFi networks with poor security and breaking into them. “A pretty simple script scans for WiFi networks over and over again in short intervals,” Siegel says. “One can read the SSID (name of the WiFi network) and identify its encryption (WPA, WPA2, or none), plus, the device can find hidden networks.” Siegel found a script for breaking WiFi encryption after doing a simple Google search.

After Cosmo’s hardware finds an unsecure WiFi hotspot, it can amplify it to the point that anyone within 650 feet can use access it.

Siegel quips on his website that cats could be trained to “linger inside areas with high network coverage” to enable activities like sharing files and information anonymously.

When asked what he had learned about the current state of WiFi security in Bremen, Siegel concludes: “People should update their router software and use proper encryption. Oh, and don’t share private stuff in public folders.”

Tags: Article Security Smart Environments Technologies Vertical Industries

Related


  • IoT security
    IoT Device Security: Risk Assessment, Hygiene Are Key
    As devices and data proliferate at the edge of the network, IT pros have encountered new challenges in securing enterprise IT systems.
  • Build Connected Devices on Twilio IoT’s New Platforms
    Does your embedded IoT development team need a tightly integrated, ready-to-deploy IoT platform that lets you quickly build and commission your connected devices to the field? Or does it need a highly flexible IoT platform that lets you reuse your code and do things your way, but still take care of critical security and reliability? […]
  • Five Principles in a Zero-Trust Security Approach to IoT
    IoT devices have created vulnerability for IT networks, but a zero-trust security approach can lock down attack vectors. Here are five key principles.
  • Image shows a drone taking aerial photos at sunset.
    Drone Infrastructure Needs Attention From Cities
    Cities see drone technology as a potential problem solver for traffic congestion and gaps in emergency service delivery. But drone infrastructure hasn’t gotten sufficient attention.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • COVID-19 Driving Data Integration Projects in IoT
  • Intro to LynxSecure
  • Can Privacy-Preserving Machine Learning Overcome Data-Sharing Worries?
  • Cybersecurity Crisis Management During the Coronavirus Pandemic

News

View all

Private LTE Market Projected to Grow to $13 Billion

12th January 2021

IoT World Announces 2021 IoT World Advisory Board

9th December 2020

White Papers

View all

Smart and Flexible Automotive and Tire Production

20th December 2020

Unlock the Potential of Digital Transformation in Oil & Gas

15th December 2020

Special Reports

View all

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

Webinars

View all

From Insights to Action: Best Practices for Implementing Connected Device Security

15th December 2020

Real Cyber Threats and Best Practices Cyber Security Strategy and Solutions for Smart Manufacturing

1st December 2020

Galleries

View all

Top IoT Trends to Watch in 2020

26th January 2020

Five of the Most Promising Digital Health Technologies

14th January 2020

Industry Perspectives

View all

IoT Spending Holds Firm — Tempered by Dose of ‘IoT Pragmatism’

1st December 2020

The Great IoT Connectivity Lockdown

11th May 2020

Events

View all

IoT at the Edge

17th March 2021

Embedded IoT World 2021

28th April 2021 - 29th April 2021

IoT World 2021

2nd November 2021 - 4th November 2021

Twitter

IoTWorldToday, IoTWorldSeries

#IoTsecuritytrends in 2021 will feature new threats given #remotework, #digitalhealth and #edgecomputing.… twitter.com/i/web/status/1…

25th January 2021
IoTWorldToday, IoTWorldSeries

Protecting Your Network Against Ripple20 Vulnerabilities dlvr.it/RrJhpD https://t.co/Q2xe5hoy4U

25th January 2021
IoTWorldToday, IoTWorldSeries

The DOD turned to #kubernetes #containers for #IoTdevelopment to brace for rapid change. dlvr.it/RqzsLz https://t.co/t8W7coEdZN

20th January 2021
IoTWorldToday, IoTWorldSeries

Food for thought: Food and Beverage Industry eBook @ROKAutomation dlvr.it/Rqz00T https://t.co/Z3y18vuozF

20th January 2021
IoTWorldToday, IoTWorldSeries

Facility of the Future dlvr.it/Rqyzvm https://t.co/ytpsOUTtGP

20th January 2021
IoTWorldToday, IoTWorldSeries

A new day in automotive production #digitalmanufacturingsolutions @ROKAutomation dlvr.it/RqyrNS https://t.co/yxPFrBZGVg

20th January 2021
IoTWorldToday, IoTWorldSeries

Unlock the potential of digital transformation in Oil & Gas @ROKAutomation dlvr.it/RqyrBV https://t.co/kzHcGjf2OK

20th January 2021
IoTWorldToday, IoTWorldSeries

.@Airbus’s #datdriven #digitaltransformation focused on getting its existing data in order rather than just gatheri… twitter.com/i/web/status/1…

19th January 2021

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X