Real-World Incidents

Case Studies

Documented incidents of BLE tracker stalking and WiFi-based attacks — and exactly how VigilWatch detects, alerts, and helps document each threat type for law enforcement.

BLE Stalking Cases ↓ WiFi Attack Cases ↓

Cases are based on publicly reported incidents from 2024–2025. Names and case details sourced from court records and law enforcement reports. VigilWatch detection sections are illustrative based on app capabilities.

80%
Stalking involves technology
896%
Rise in BLE tracker stalking (UK 2024)
14%+
Stalking cases use location tracking
1,034%
Rise in coercive control linked to BLE trackers (UK)
Bluetooth Stalking

BLE Tracker Stalking Cases

AirTags, SmartTags, and Tile trackers have been weaponized in stalking and domestic abuse — hidden in wheel wells, bumpers, bags, and children's belongings. These are documented incidents from 2024–2025.

🏠
BLE Case #1 · Fort Myers, Florida · February 2026

Ex-Husband Arrested After Apple AirTag Found Hidden Inside Ex-Wife's Vehicle

Nicholas Brezina · Charged with installing a tracking device without consent · AirTag concealed inside vehicle

DOMESTIC STALKING VEHICLE TRACKER ARRESTED FEBRUARY 2026

What Happened

Fort Myers police discovered an Apple AirTag hidden inside a vehicle belonging to Nicholas Brezina's ex-wife during an active investigation in mid-February 2026. Brezina was arrested and charged with installing a tracking device without consent — a violation of Florida law.

The case highlights how BLE trackers designed for locating lost items — and distributed through Apple's vast Find My network — are routinely repurposed as silent, long-range surveillance tools against intimate partners. The device required no phone pairing with the victim, no line of sight, and no technical skill to deploy.

⚖️ LEGAL OUTCOME Brezina was arrested in mid-February 2026 and charged with installing a tracking device without consent. The AirTag was recovered by Fort Myers police during the investigation. The charge carries criminal penalties under Florida statute prohibiting covert vehicle surveillance.

How VigilWatch Would Detect This

  • 1
    The concealed AirTag broadcasts Apple's Find My service UUID — VigilWatch's Live Feed immediately flags it as an AirTag-class BLE device the first time it's detected near the vehicle.
  • 2
    Follow-Me Detection tracks the device across locations — home, work, errands — and raises a Follow Score alert once the unknown tracker is confirmed to be traveling with the user.
  • 3
    Tag Fingerprinting locks onto the device's unique identifier so it can't evade detection by cycling its advertising address — a technique some trackers use to avoid anti-stalking software.
  • 4
    Classify as Threat and enable Alert Immediately for strobing red screen and heavy haptic feedback each time the device is detected — providing real-time warning even before Apple's own delayed notifications fire.
  • 5
    Automatic evidence logging generates a timestamped, court-ready PDF with GPS sighting history, signal strength data, and device fingerprint — exactly the documentation law enforcement used to build the case here.
1AirTag recovered
SilentNo victim notification until found
Real-TimeVigilWatch alert on first scan
PDFCourt-ready evidence log
🚔
BLE Case #2 · DeLand / Volusia County, Florida · February 2025–March 2026

Sheriff's Deputy Stalks Ex-Girlfriend and Her Adult Daughter with Multiple AirTags Across Two Vehicles

James Kleeman, 65 · Part-time prisoner transport deputy, Volusia County Sheriff's Office · Terminated upon arrest · Multiple AirTags placed in two separate vehicles

MULTI-VEHICLE LAW ENFORCEMENT PERPETRATOR ARRESTED MARCH 2026

What Happened

James Kleeman, a part-time prisoner transport deputy with the Volusia County Sheriff's Office, allegedly placed multiple Apple AirTags in both his ex-girlfriend's vehicle and her adult daughter's vehicle after their February breakup. The victim first received AirTag alerts and discovered devices as far back as 2025, with additional placements confirmed after the relationship ended.

Ring camera footage captured Kleeman crawling under one of the vehicles with a flashlight during a covert device placement. He admitted to placing the AirTags but denied following the victims. On the day of his arrest, his marked sheriff's vehicle was reportedly spotted near the victim's location while she was giving a statement to detectives in DeLand.

⚖️ LEGAL OUTCOME Kleeman was arrested March 25, 2026 and terminated from the Volusia County Sheriff's Office upon arrest. Detectives recovered the AirTags during the investigation. The case illustrates how positional authority — access to a law enforcement vehicle and knowledge of police procedure — can be weaponized alongside consumer tracking devices.

How VigilWatch Would Detect This

  • 1
    Unknown BLE devices appear in the Live Feed across both vehicles — each broadcasting Apple Find My service UUID, identifying them as AirTag-class trackers even before the first alert fires.
  • 2
    Follow-Me Detection flags each device independently across multiple locations. With placements in two vehicles, both devices accumulate Follow Score simultaneously — doubling the detection surface.
  • 3
    14-day Frequency Trend shows ESCALATING badge for both devices — detections increasing over time as new placements follow removal of earlier ones.
  • 4
    Home and Workplace zones trigger instant alerts each time either tagged vehicle enters a known location — providing early warning even when the victim isn't actively scanning.
  • 5
    PDF evidence report with full multi-device timeline, GPS sighting log, and signal history — ready to hand directly to detectives at the point of report, as in this case.
2Vehicles targeted
13+ mo.Surveillance duration
ESCALATING14-day trend pattern
PDFEvidence ready for detectives
🚗
BLE Case #3 · Indiana County, Pennsylvania · January–February 2025

Ex-Boyfriend Places AirTag in Wheel Well After Breakup

Danish Ali, 33 · Charged felony + stalking + harassment · AirTag duct-taped to rear wheel well

FOLLOW-ME PATTERN WHEEL WELL PLACEMENT CONVICTED

What Happened

A woman entered her car and immediately received an AirTag connection alert on her phone. Police located a device duct-taped to the rear passenger-side wheel well. Her ex-boyfriend, Danish Ali, admitted placing it after their breakup to track her movements.

The AirTag's serial number and the last four digits of Ali's phone number directly linked the device to him — providing law enforcement with unambiguous evidence.

⚖️ LEGAL OUTCOME Charged with felony criminal use of a communication facility, misdemeanor stalking, and harassment. The AirTag's serial number tied directly to the defendant.

How VigilWatch Would Detect This

  • 1
    The persistent unknown BLE beacon appears in the Live Feed with strong RSSI during daily drives — close-range signal indicating a nearby hidden device.
  • 2
    Follow-Me Detection flags it across 3+ locations (home → work → errands) with a rising Follow Score. Once it crosses 50+, the Follow-Me Banner fires.
  • 3
    Set up a Home zone (50–100m radius) to trigger instant zone-entry alerts on each return home.
  • 4
    Tap to classify as Threat → toggle Alert Immediately for strobing red screen + heavy haptics.
  • 5
    Export PDF report (with unique case number, full location timeline, Daily Pattern chart) directly to police — ready in seconds.
3+Locations detected
-44 dBmTypical wheel-well RSSI
HIGHFollow Score confidence
PDFEvidence ready for police
🏠
BLE Case #4 · Hillsborough County, Florida · October 2025

Couple Followed Home After Shopping — Armed Robbery via AirTag

AirTag taped under bumper in public parking lot · Suspects followed victims to residence · Armed robbery

HOME INVASION VEHICLE TRACKING NATIONWIDE PATTERN

What Happened

Suspects taped an AirTag under a couple's vehicle bumper in a public parking lot. They then followed the couple home and robbed them at their residence. Security video captured the robbery. Police recovered the AirTag and confirmed it was used to track the victims' exact route and home address.

This pattern — using BLE trackers not for surveillance but for coordinating home invasions — has been reported in multiple cities. Ex-partners and organized theft rings have used the same tactic for vehicle theft follow-ups.

⚖️ LEGAL OUTCOME Suspects charged in the armed robbery. The AirTag confirmed as evidence of premeditated tracking. Similar cases reported nationwide linking BLE trackers to coordinated home invasions.

How VigilWatch Would Detect This

  • 1
    The animated radar shows a new unknown device pulsing the moment you enter the parking lot — before you've driven anywhere.
  • 2
    Interval mode (every 5–15 min) catches it passively in the background while driving. Live Feed + signal chart tracks movement with you in real time.
  • 3
    When the unknown device enters your Home zone, a zone-specific alert fires immediately — before you exit the vehicle.
  • 4
    Follow Score (location count + geographic span) hits detection threshold after just two distinct location clusters.
  • 5
    Classify as Threat, export CSV sighting log + heatmap for investigators. Do not go inside — call police from your vehicle.
2–3Locations to trigger
5 minRecommended interval mode
Zone alertHome entry trigger
CSV + PDFEvidence for investigators
🇬🇧
BLE Case #5 · Swansea Crown Court, United Kingdom · 2024–2025

Ex-Partner Glues AirTag Under Car — Daughter Discovers Months Later

AirTag glued under bumper · Victim received repeated phone notifications · 896% rise in BLE stalking across UK

COERCIVE CONTROL COMMUTE PATTERN 5-YEAR PROTECTION ORDER

What Happened

A woman received repeated phone notifications about an unknown AirTag but didn't understand their significance. Her ex-partner had glued a tracker under her car bumper. Her daughter later received the same alerts, leading to discovery of the device.

This case reflects a devastating UK trend: AirTag and GPS stalking rose 896% (from 57 to 568 cases) by end-2024, mostly linked to coercive control and domestic abuse. BLE trackers were connected to a 1,034% rise in coercive control cases during the same period.

⚖️ LEGAL OUTCOME Ex pleaded guilty to stalking. Victim obtained a 5-year stalking protection order. Case contributed to broader UK awareness of BLE tracker abuse in coercive control situations.

How VigilWatch Would Detect This Earlier

  • 1
    Unknown BLE device appears in Device Library. Bluetooth services list shows Apple Find My service UUID — a direct indicator of an AirTag-class device.
  • 2
    Daily Pattern Analysis (radial chart available after 3+ sightings) auto-detects COMMUTE pattern — morning and evening peaks matching her daily routine.
  • 3
    14-day Frequency Trend shows ESCALATING badge (red ↑) — the device is being detected more often over time, not less.
  • 4
    Per-device alert + "Seen N times" (set to 3) notifies immediately — without waiting for phone-native AirTag alerts that many victims don't understand.
  • 5
    PDF export includes full timeline + legal disclaimer — used as primary evidence in stalking protection order hearings.
896%Rise in UK BLE stalking
COMMUTEAuto-detected pattern
ESCALATING14-day trend badge
Court readyPDF evidence export
👜
BLE Case #6 · Class-Action Lawsuit (Hughes v. Apple) · Ongoing 2024–2025

Multi-Device Stalking — Second Tracker Hidden in Child's Pencil Bag

Two AirTags found · First in vehicle, second in son's pencil bag · Months of stalking despite police involvement

MULTI-DEVICE CHILD ITEM HIDDEN CLASS ACTION

What Happened

A woman received an AirTag alert after a court hearing with her ex-husband. She found and disabled one device in her car — but alerts persisted for months. Police involvement failed to stop the stalking. She later discovered a second AirTag hidden in her son's pencil bag, allowing her ex-husband to track her movements even after the first device was removed.

The inability to remotely disable trackers, the emotional and professional toll (forcing her to abandon her acting career and relocate), and the failure of Apple's safety features are at the core of an ongoing class-action lawsuit. At least two murders have been linked to AirTag tracking in similar domestic cases.

⚠️ ONGOING LITIGATION Part of Hughes v. Apple class-action lawsuit. Claims include negligence in safety feature design: delayed alerts, no remote disable, insufficient anti-stalking protections. At least two deaths linked to similar AirTag stalking patterns.

How VigilWatch Addresses Multi-Device Threats

  • 1
    Multiple unknown BLE devices appear simultaneously in the radar display with color-coded RSSI. Strong signal on two different unknowns — in car and near school bag — both flagged independently.
  • 2
    Device Details screen reveals Apple Find My services list + connectability data for each device — making AirTag-class trackers identifiable even without manufacturer name.
  • 3
    Location Zones with buffer radius flag both the car tracker and the child-item tracker entering your Home zone — each triggering separate alerts.
  • 4
    Alert Immediately mode on both devices triggers full-screen red strobe + heavy haptics the moment either appears — even if you've temporarily lost sight of one.
  • 5
    Analytics Reports — threat distribution bar chart + interactive heatmap across all devices — provide visual evidence of coordinated multi-device surveillance for attorneys and courts.
2Devices hidden simultaneously
MonthsDuration before 2nd found
Multi-alertPer-device Alert Immediately
HeatmapCoordinated pattern evidence

Key Patterns Across BLE Stalking Cases

Understanding how these attacks work helps VigilWatch detect them faster.

Hiding Spots

Wheel wells, bumpers, children's belongings, purses, gym bags. Strong RSSI in VigilWatch (-40 to -55 dBm) pinpoints physical closeness before visual search.

Escalation Pattern

Starts as "Unknown" device. Becomes persistent. Follow Score rises over days. ESCALATING trend badge appears. Then used to coordinate a crime or continue coercive control.

Victim Impact

Anxiety, career loss, forced relocation, and in the worst cases, physical violence. 80% of stalking involves technology; 14%+ uses location tracking devices specifically.

Evidence Works

In every conviction above, the device's traceable data was key. VigilWatch's timestamped location timeline + PDF case number provides the same level of documentation — from your phone, instantly.

WiFi-Based Attacks

WiFi Attack & Rogue Network Cases

Evil twin networks, rogue access points, and WiFi-based surveillance — used in airports, cafés, apartments, and domestic abuse situations.

✈️
WiFi Case #1 · Perth, Melbourne, Adelaide, Australia · Arrested April 2024 · Sentenced November 2025

In-Flight Evil Twin WiFi Attack — 7 Years Prison

Michael Clapsis, 44 · WiFi Pineapple device on domestic flights · Credential theft + intimate photo access · Australian Federal Police

EVIL TWIN ATTACK CREDENTIAL THEFT CONVICTED · 7 YRS

What Happened

A 44-year-old IT-savvy man carried a portable WiFi Pineapple device onto domestic flights and used it at airports across Perth, Melbourne, and Adelaide. He created "evil twin" networks mimicking legitimate airport and airline WiFi SSIDs — tricking passengers into connecting.

Victims who connected encountered fake login pages designed to capture credentials. The attacker then used those credentials to access social media, email accounts, and intimate photos and videos of multiple women. Australian Federal Police confirmed he also passively listened for device probe requests to gather data without requiring a connection.

Flight crew spotted the suspicious network and alerted authorities. He was arrested in April 2024.

⚖️ LEGAL OUTCOME Sentenced November 2025: 7 years 4 months in prison, eligible for parole after 5 years. AFP confirmed this as deliberate, premeditated cyber-stalking across multiple jurisdictions.

How VigilWatch Would Detect This

  • 1
    During a travel scan, an unknown or open WiFi AP with the same SSID as airport WiFi appears in Live Feed — with BSSID, security (Open vs WPA2), frequency, and channel visible for comparison against the real network.
  • 2
    If the rogue AP's BSSID doesn't match the airport's known access points, it's immediately suspicious. Open security on a network claiming to be "AirportWifi" is a major red flag.
  • 3
    Follow-Me algorithm using Haversine clustering flags if the rogue AP "follows" across multiple airports or terminals — an impossible pattern for a stationary access point.
  • 4
    Set up Travel or Airport zones (100–250m radius) to trigger alerts on unexpected new WiFi devices appearing in those protected areas.
  • 5
    Classify as Threat, toggle Alert Immediately, and export PDF report (case number, timeline, threat banner, legal disclaimer) for AFP or local authorities.
3Cities targeted
OpenNetwork security type — detectable
7 yrsPrison sentence
BSSIDMatches rogue across airports
WiFi Case #2 · Public Spaces · 2024 — Parallel Incidents (WA Man / Similar Patterns)

Portable Rogue WiFi Hotspot for Credential Theft in Public Spaces

Mobile rogue AP deployed at cafés and public venues · Same BSSID across locations · Fake free WiFi for passive data collection

ROGUE AP MULTI-LOCATION CROSS-LOCATION MATCH

What Happened

The same perpetrator (and parallel uncharged patterns) deployed fake free WiFi networks — often named "FREE_PUBLIC_WIFI" or mimicking café names — in public spaces. Victims connected assuming the network was legitimate, allowing the attacker to capture login credentials, monitor web activity, and in some cases harvest intimate files.

Beyond active connections, probe requests from phones (where a device automatically asks "is my saved network nearby?") allowed passive tracking of device presence even without the victim fully connecting. This technique requires no interaction from the victim — just physical proximity.

⚖️ LEGAL OUTCOME Part of the broader AFP investigation leading to the 7-year sentence. Highlights how portable WiFi devices turn any public space into a credential theft and surveillance vector.

How VigilWatch Would Detect This

  • 1
    WiFi-specific details in the Live Feed — SSID, security type (Open is a red flag), frequency band, and BSSID — reveal suspicious open networks or duplicates of known safe networks.
  • 2
    The same BSSID appearing across multiple café locations is an impossible pattern for a fixed access point — confirming it's a mobile rogue device traveling with someone.
  • 3
    "Times seen" counter + Daily Pattern Analysis (24-hr radial chart) shows recurring patterns like COMMUTE or NIGHTTIME ACTIVITY from the rogue device — evidence it moves with a person.
  • 4
    Watchlist Filter Tabs (THREAT / FOLLOW) surface the device prominently. Export CSV sighting log for Excel-based analysis of BSSID persistence across date-stamped locations.
Same BSSIDKey cross-location identifier
OpenSecurity type (no password)
PassiveProbe request harvesting
CSV exportExcel-ready sighting log
🏢
WiFi Case #3 · Shared Apartment / Fourplex · Ongoing Reports 2024–2025

Neighbor WiFi Hacking & Cyber-Stalking in Shared Building

Repeated device intrusion by neighbor · Private Facebook, group chats, and online activity accessed · Physical proximity exploitation

CYBER-STALKING NEIGHBOR PROXIMITY HOME ZONE THREAT

What Happened

Residents in a shared apartment building reported that a neighbor repeatedly hacked into their WiFi and monitored their devices. The attacker used rogue access points or deauthentication attacks to force device reconnections, then intercepted unencrypted traffic to access private Facebook activity, group chats, and intimate online behavior.

Victims described the attacker demonstrating knowledge of private conversations — only possible through network interception. This hybrid cyber-physical stalking leveraged close physical proximity (same building) combined with WiFi exploitation, making traditional security tools ineffective.

⚠️ UNRESOLVED / ONGOING PATTERN Victims sought help on Reddit and online forums after limited police response. Cases involving neighbors and shared buildings are underreported due to difficulty proving the attacker's identity without RF detection tools.

How VigilWatch Would Detect This

  • 1
    Unknown WiFi APs or devices with unfamiliar manufacturer info appear in the Device Library with strong RSSI — the close proximity of an apartment building makes signal strength especially significant.
  • 2
    RSSI color-coded indicator shows strong/close signals from "neighbor" devices — -40 to -55 dBm means same floor or adjacent unit.
  • 3
    Interactive location heatmap (density mode) visualizes repeated sightings concentrated in your Home zone — showing a persistently present device that never leaves your building.
  • 4
    14-day Frequency Trend with regression line flags ESCALATING (red ↑) — the device is detected more frequently over time, consistent with ongoing surveillance rather than a one-time presence.
  • 5
    Mark as Concern/Threat, add custom notes and timestamps, and generate PDF evidence with the full sighting summary for police — giving investigators a documented RF record they can correlate with network logs.
-40 dBmSame-floor signal
Home zonePersistent presence alert
ESCALATINGTrend badge indicator
NotesCustom evidence annotation
📡
WiFi Case #4 · Research-Enabled Real-World Risk · 2024–2025

WiFi Signal-Based Motion Inference — Tracking Through Walls Without a Connection

Commodity WiFi receivers used to track movement patterns · No device connection required · Domestic abuse exploitation documented

PASSIVE TRACKING NO CONNECTION NEEDED DOMESTIC ABUSE VECTOR

What Happened

Advanced research and documented real-world cases show that attackers can use commodity WiFi receivers or planted rogue access points to track movement inside homes through signal strength fluctuations — without the victim ever connecting to any network. This technique infers occupancy, room-level activity, and daily routines from the RF environment alone.

In domestic abuse contexts, abusers have exploited shared home networks or planted small WiFi-enabled devices (including modified IoT gadgets) to maintain surveillance of victims after they've severed digital connections. This attack is particularly insidious because the victim never receives any notification — there's nothing to dismiss.

⚠️ EMERGING THREAT PATTERN Public reports include neighbors and ex-partners using WiFi for passive surveillance. Linked to broader tech-facilitated abuse trends: 80% of stalking involves technology; location tracking rising year-over-year.

How VigilWatch Provides Visibility

  • 1
    Live Feed + signal chart tracks RSSI of unknown WiFi devices in real time — visualizing the RF environment around you, not just connections you've made.
  • 2
    Bluetooth & WiFi toggle lets you isolate WiFi-only scans to focus on unexpected access points or broadcasting devices near your home.
  • 3
    Zone device counts alert on unexpected new entries into your Home or protected zones — even if the device is not directly targeting your phone.
  • 4
    Per-device analysis (full location history + Follow Score using location count, geographic span, recency) detects multi-location patterns even from WiFi devices that shouldn't be mobile.
  • 5
    Analytics Reports — devices over time stacked area chart + threat distribution — provide visual evidence of the pattern's scale and persistence for law enforcement and housing authorities.
0Connections needed to be tracked
Room-levelMovement inference possible
Real-timeRSSI monitoring
AnalyticsPattern visualization
Protection Layers

How VigilWatch Addresses Every Threat Pattern

📡

Scan Modes + Live Feed Radar

Real-time unknown BLE and WiFi device detection. Toggle BT and WiFi independently. Animated radar visualizes signal proximity the moment a device appears.

🎯

Follow-Me Algorithm

3+ distinct locations + Follow Score ≥ 50 triggers detection banner. HIGH confidence at 75+. Haversine formula clusters real-world GPS locations 50m+ apart.

📍

Zones & Alert System

Named zones (Home/Office, 50–500m radius) with device counts. Alerts fire on new Unknowns, "Seen N times," zone entry, or confirmed Follow-Me detection.

🔍

Classification & Device Details

Mark as Threat or Concern instantly. View Bluetooth services list, RSSI guide, manufacturer info, times seen. Apple Find My UUID identifies AirTag-class devices.

🚨

Alert Immediately Mode

Per-device emergency toggle: screen strobes red, full-screen modal with device info, heavy haptics. Persists until dismissed. Works independently per device for multi-tracker situations.

📄

Evidence Export

PDF report with unique case number (VW-YYYYMMDD-XXXX), full location timeline, Daily Pattern clock, 14-day Frequency Trend, and legal disclaimer — ready for law enforcement in seconds.

Scenario Films

These Situations Are Real

Illustrative scenarios showing the environments where VigilWatch matters most.

Commute Tracking

BLE tracker follows same route every day — COMMUTE pattern detected.

Hotel Room Scanner

BLE sniffer at -38 dBm — same-room signal — flagged on Continuous scan.

Rogue WiFi in Coffee Shop

Same BSSID appears across multiple café visits — mobile rogue AP confirmed.

Isolated Location Alert

Strong-signal unknown device triggers Alert Immediately in a parking garage.

Subway Sniffer

BLE scanner on platform detected across multiple commutes — WORKDAY OVERLAP.

Parking Lot Placement

Tracker placed in lot. VigilWatch detects it before the drive home begins.

Deep Dive

Decoding Digital Stalking

Understanding how stalkers use technology — and how to detect and document it.

The Evidence Trail

How VigilWatch helps you capture and export the proof you need.

Digital stalking patterns and detection methods
From the Community

Real People. Real Threats. Real Questions.

These are the kinds of situations people post about every day on Reddit — in r/privacy, r/TwoXChromosomes, r/Stalking, r/whatisit, and r/cybersecurity. VigilWatch was built for every one of them.

🚗 r/whatisit

"Found this taped under my car. Someone's been sending me weird texts knowing things they shouldn't. What is this thing?"

VigilWatch would have flagged the tracker days earlier — detecting the same unknown Bluetooth device appearing at your home, workplace, and every stop in between, long before you noticed the texts.

🔒 r/privacy

"What's the best app to detect unknown Bluetooth devices near me? I keep seeing the same device name pop up wherever I go."

The Follow-Me Detection engine scores every persistent device across 5 dimensions — frequency, multi-location overlap, RSSI proximity, time-of-day patterns, and zone entry. One unknown device following you gets caught. Fast.

📱 r/iphone

"Got an 'Unknown AirTag following you' alert. I found it and disabled it — but is there anything else I should be watching for?"

Apple only alerts on its own ecosystem. VigilWatch catches all Bluetooth trackers — Tile, Samsung SmartTag, off-brand devices, and hardware fingerprints — and builds a multi-location timeline you can export as a legal PDF.

🛡️ r/Stalking

"Does anyone know of an app that can tell me if my abuser planted a tracker on me? I'm trying to document everything."

VigilWatch requires no account and uploads nothing. Evidence exports include a unique case number, GPS-stamped timeline, signal frequency charts, and a legal disclaimer — formatted for law enforcement submission.

📶 r/cybersecurity

"How do I detect an evil twin WiFi attack on my phone? I'm on public WiFi a lot for work."

VigilWatch's WiFi scanner monitors for rogue access points — networks with matching SSIDs but mismatched signal behavior — and flags them before your phone connects. Most VPNs don't warn you until after the fact.

🏪 r/Scams

"I think someone put a tracker on my car at the mall to follow me home. Is that actually a thing? What can I do?"

It's a documented theft method. Run VigilWatch in Continuous mode after visiting high-traffic areas — parking lots, malls, airports. Any new tracker that stays with you across locations gets flagged within minutes.

These communities exist because the threat is real and growing. In 2025 alone, over 100 criminal charges were filed in the US tied to covert Bluetooth tracking devices — the highest spike since AirTags launched.

If You're Reading This, You Need This App

Free. No account. No cloud. Every scan is private. The evidence export could make the difference.

Join the Waitlist Read: Follow-Me Detection

If you are in immediate danger, call 911 (US) or your local emergency services first.