SkyLift - WiFi Geolocation Spoofing Device
For !Mediengruppe Bitnik’s Assange Room. Made in collaboration with Surya Mattu.
- June 2017: Estimated release for SkyLift devices. Sign up for product launch notifcations here
- May 5, 2017: Interview with Schloss Solitude https://schloss-post.com/the-future-of-living-with-surveillance/
- May 5, 2017: Code and build instructions on https://github.com/adamhrv/skylift
- August 2016: SkyLift V0.1 proof of concept research
SkyLift is a geolocation decoy that virtually relocates visitors to Julian Assange’s residence at the Ecuadorian Embassy in London. The device was made for !Mediengruppe Bitnik’s Assange room and works by broadcasting WiFi signals that exploit a smartphone’s reliance on using nearby MAC addresses for location services.
You can now make your own custom locations with the instructions on GitHub.
SkyLift works without connecting to any WiFi network. The only requirements are that you have WiFi turned on and location services enabled. There is no IP spoofing, no GPS signal spoofing, no VPN, and no 3rd party app involved.
Once inside Bitnik’s Assange room, SkyLift will adjust your smartphone’s location to approximately 3 Hans Crescent Knightsbridge, London SW1X 0LS (The Ecuadorian Embassy in London). There, you can check-in or share photos that will be tagged with the approximate latitude and longitude of the Ecuadorian Embassy in London.
The WiFi data used for SkyLift was collected onsite in London with a WiFi scanning device. The information displayed on the computer’s screen (above and in gallery) shows each of the unique MAC addresses (BSSIDs) and their associated network name from routers nearby the embassy. This information is rebroadcast inside the exhibition space to emulate over 60 WiFi access points that exist near the real Ecuadorian Embassy in London.
You can now get a copy of the Ecuadorian Embassy WiFi scan from GitHub.
SkyLift launched at the !Mediengruppe Bitnik Welcome to Ecuador show on June 25, 2016 curated by Aude Launay at Zoo Galerie in Nantes, France.
- Version 0.3 made with support from a web residency with Akademie Schloss Solitude & ZKM
- Version 0.2 made with support from exhibitions at La Gaîté Lyrique and FACT Liverpool.
- Version 0.1 made with support from Zoo Galerie in Nantes, France.
- Research and development of proof of concept: Surya Mattu (US) suryamattu.com
- Concept in collaboration with !Mediengruppe Bitnik
- Technical advisement from Julian Oliver (DE) julianoliver.com | packetbridge
- Research assistance and Python development contributions by Leon Eckert (US/DE)
Earlier Projects on WiFi Geolocation Spoofing and Beacon Frames
- Location Spoofing Possible With WiFi Devices (2008)
- PacketBridge (2012)
- How to Spoof Wi-Fi Geo-location (2013)
- Don’t Trust Geolocation (2013)
- Spoofing WiFi AP Based Geolocation (2013)
- Beacon Frame Overview
- Beacon Frame Packet Structure
- Geolocation API by LocationAPI
- Geolocation API by Google
- https://mitmproxy.org/ use this to inspect where BSSIDs are being sent
- Interesting paper on carrying out a targeted attack using WiFi Geolocation Spoofing
- Using mdk3 in beacon floodmode
- WiFi Beacon Jammer