Blog
I Spoofed a Cell Tower with €100—Now I Teach Cybersecurity to the Next Gen of Hackers
The First Time I Hijacked a Signal
Back in 2012, I was working on an EU-funded project and had just started experimenting with a €100 software-defined radio (SDR). One afternoon, I managed to spoof a mobile base station. Suddenly, phones around me disconnected from the real network and latched onto mine—just like that.
At first, it felt like a tech breakthrough. But the thrill quickly faded into something darker: If I could do this in a tiny lab with low-cost equipment, imagine what a real attacker could do in a crowded city street.
That moment changed my view of cybersecurity. It made three things crystal clear—lessons I now teach to every student I mentor.
Lesson 1: Every System Has a Weak Spot
Cyberattacks are getting more expensive and more common. One breach today can cost a company an average of $4.88 million in damages and cleanup. That’s not just a corporate problem—it’s a developer problem. Any code you write, from a school app to a weekend IoT project, can be a target.
Try this now: Use a free vulnerability scanner on one of your GitHub repos. Fix the first issue you find. It’s a small step—but one that makes the internet a little safer and gives you a satisfying taste of what real defenders do.
Lesson 2: The World Needs Cyber Defenders—Badly
There’s a global shortage of 4.8 million cybersecurity professionals. That’s a 19% gap and growing fast. The skills you develop now—like analyzing packets, modeling threats, or securing machine learning systems—can make you one of the most sought-after engineers out there.
Try this now: Sign up for a Capture-the-Flag (CTF) competition. You’ll learn to tackle real-world exploits, sharpen your teamwork, and get noticed by recruiters who care more about scoreboard rankings than GPAs.
Lesson 3: Launch It Safe or Don’t Launch It at All
In early 2024, attacks on IoT devices shot up by 107%. From smart homes to factory machines, everything with a chip is a potential target. Most IoT devices today are just tiny Linux computers. Without proper security, your smart toaster could become a hacker’s next tool.
Try this now: Grab an ESP32 board. Update its firmware, then harden it: disable unused ports, enable TLS, and set up a fallback mechanism in case something breaks. This is how you learn secure deployment—and why it matters.
Full Circle: From Attacker to Educator
That SDR I used to spoof a tower? I still have it. But today, it’s not a hacking tool—it’s a classroom demo. I show students how the attack works, then teach them how to stop it.
It’s not just about showing what’s possible. It’s about helping the next generation build a safer internet, from the ground up.
Ready to Make an Impact?
If you’re excited about cybersecurity, machine learning, and protecting the connected world, consider the Master’s in Machine Learning and Cybersecurity for Internet Connected Systems at UPC.
Turn your curiosity into real-world skills—and become the hacker the world needs.
