Intelligence Center

The Science Behind the Scan

VigilWatch doesn't just detect — it analyzes. Here's how the detection engine works, from raw radio signals to court-ready evidence.

The Core Problem

How Modern Trackers Hide

Sophisticated adversaries favor $30 consumer trackers and rogue access points because they blend into the wireless background. Understanding their evasion tactics is the first step to defeating them.

🔄 MAC Address Rotation

Devices like Apple AirTags and Samsung SmartTags rotate their MAC addresses every 15 minutes to defeat persistent tracking. A naive scanner sees a "new" device each time. VigilWatch looks past the ephemeral MAC and identifies unique hardware fingerprints instead — Bluetooth Service UUIDs, Manufacturer IDs, and signal behavior patterns.

📡 Manufacturer Fingerprints

Every tracker family has a fixed hardware signature. VigilWatch identifies Apple Find My devices via UUID 0x4C00, Samsung SmartTags via 0xFD5A, and Tile devices via Manufacturer ID 0x00CC. These fingerprints survive MAC rotation and positively identify the tracker type even without a brand name in the packet.

📶 Signal Flooding

Urban environments produce hundreds of simultaneous BLE and WiFi signals. Attackers rely on this noise to hide a tracker in plain sight. VigilWatch's behavioral scoring engine separates ambient background devices (your neighbor's TV, the office printer) from persistent followers using a multi-dimensional analysis that pure signal strength cannot achieve.

🌐 Evil Twin Networks

Rogue access points mimic legitimate network names ("Starbucks_WiFi", hotel SSIDs) and automatically capture credentials from devices that auto-connect. The attacker doesn't need physical access to the target's device — just proximity and a $50 WiFi Pineapple. VigilWatch detects open, duplicate-SSID, and deauthentication-attack networks in real time.

Signal Intelligence

Reading RSSI: Signal Strength as Distance

RSSI (Received Signal Strength Indicator), measured in dBm, is the primary proxy for physical distance. Every VigilWatch alert is anchored to an RSSI reading that tells you how close the threat actually is.

Signal Tier RSSI Range Physical Distance Tactical Meaning
🔴 Strong / Breach ≥ −40 dBm Within 1–2 meters Immediate physical breach. The device is on the subject's person, in the same vehicle, or in the same room. Initiate a tactical sweep before changing location.
🟠 Strong ≥ −55 dBm Within ~3 meters Device is in the immediate inner perimeter — likely attached to a vehicle, bag, or jacket. High confidence of intentional placement.
🟡 Good −55 to −70 dBm 3–10 meters Device is within the secondary perimeter — adjacent room, nearby parked vehicle, or a following car. Warrants monitoring and cross-location correlation.
⚪ Weak / Ambient < −70 dBm 10+ meters Likely background noise or distant passing traffic. Included in behavioral scoring but not independently actionable without persistence data.

* RSSI values are approximate and vary by environment, obstacles, and device hardware. VigilWatch calibrates thresholds based on scan history.

Behavioral Analysis

The 5-Dimension Follow Score

A single detection means nothing. The Follow Score (0–100) is a multi-dimensional metric that transitions detection from reactive alerts to a probabilistic model of active surveillance — designed to eliminate false positives and surface real threats.

1
Persistence
Total duration the device has appeared within range across multiple scan sessions. A device seen for 30 seconds once scores near zero. A device appearing across a 6-hour window across three locations scores significantly higher.
2
Frequency
Recurrence rate after periods of absence. A device that disappears and reappears across multiple days — especially following your schedule — is weighted heavily. This distinguishes an intentional tail from coincidental proximity.
3
Location Span
Total geographical distance covered while in proximity to you. A device detected at your home, your gym, and your workplace across a 15 km span triggers a High Confidence classification. The mathematical probability of coincidence across that span is negligible.
4
Signal Consistency
RSSI stability over time. A tracker hard-mounted to a vehicle chassis maintains a very stable signal relative to the phone — it doesn't fluctuate the way a person walking past would. This dimension identifies physically attached trackers even without brand fingerprinting.
5
Hardware Type
Classification of the signal fingerprint. A known tracker brand (AirTag, Tile, SmartTag) scores higher than a generic BLE beacon, which scores higher than an unclassified device. Known tracker signatures immediately escalate threat classification regardless of follow score.
Stationary Penalty

Fixed infrastructure — office printers, neighbor WiFi routers, static smart TVs — automatically receive a stationary penalty that de-prioritizes them in the score, even if they appear "persistent." A High Confidence badge is only applied when a device achieves a high score across a 2+ km span or appears in 4+ distinct locations.

Geospatial Intelligence

Route Contamination Mapping

Mapping "Route Contamination" transforms disconnected scans into a coherent tactical timeline — proving that a device is moving in tandem with you across disparate environments.

📍 Haversine Clustering

VigilWatch uses Haversine clustering — a spherical distance calculation — to group signal detections into discrete "Locations." A 50m base parameter is used for urban environments, adjustable up to 500m for rural or high-speed transit. This algorithm determines whether an "Unknown" device is appearing at your home, office, and intermediary stops.

🗺️ Visual Evidence Layer

On the Route Contamination map, each detection is plotted as a Sighting Dot. The device's path across locations is connected by Polylines — creating a visual trail of the tracker's movement relative to yours. Analysts can filter the view to show all tracked devices, Suspects only, or confirmed Stalker Tags.

🚨 The Follow-Me Trigger

The standard threshold for escalating a device from "Unknown" to "Suspect" is appearance in 3 or more separate clustered locations. When this threshold is crossed, VigilWatch triggers an immediate alert. The contamination score assigned to each device reflects its threat level based on location count, distance, and temporal overlap with your movements.

📊 Daily Pattern Analysis

VigilWatch employs a 24-hour radial clock and 4-day frequency trend calculated via linear regression to identify escalating surveillance patterns. Signals are categorized into: COMMUTE, OFFICE, NIGHTTIME, and REST/SOCIAL. A device with an "Escalating" trend during your commute window is the highest-weight indicator of a targeted physical tail.

Configurable Detection

Proximity & Alert Thresholds

VigilWatch's detection parameters are fully configurable. Tighten them in crowded urban environments; widen them in open spaces. You control the sensitivity.

Proximity Alert Thresholds

Minimum distance at which a persistent unknown device triggers an immediate alert.

1m
Body range
2m
Personal space
3m
Room range
5m
Vehicle range
8m
Wide sweep

Location Buffer Zones

Geographic radius used by Haversine clustering to group nearby detections into a single "Location." Adjustable from 25m to 500m.

50m
Dense urban
100m
Suburban
250m
Open areas
500m
Rural / transit
Classification System

5-Level Threat Hierarchy

Every detected device is assigned a classification level. This ensures proportional response and keeps your Watchlist actionable — not flooded with noise.

Level Classification Description Action
OWN Authorized Your own devices — phone, earbuds, watch. Whitelisted and cleared from analytics. No action
FRIEND Known-Good Security detail, family members, known colleagues. Manually approved. No action
UNKNOWN Unclassified New signals not yet evaluated. VigilWatch begins behavioral scoring immediately. Monitor
CONCERN Suspicious Persistent devices or rogue networks (e.g., "Free_Public_WiFi") that warrant investigation. Investigate
THREAT Confirmed Confirmed trackers or high-score followers. Strobe + haptic alert triggered immediately. Alert + Export
Forensic Documentation

Court-Ready Evidence Export

Detection is only the midpoint. The end goal is documentation that withstands legal scrutiny — in a stalking case, a restraining order hearing, or an industrial espionage investigation.

🔢
Unique Case Numbers
Every evidence export is assigned a unique case number for chain-of-custody tracking. This links the digital evidence to a specific detection event, date, and device profile.
📶
RSSI Logs & Timestamps
Complete signal strength logs with precise timestamps showing proximity and duration of the threat across every detection session. This establishes a timeline that is difficult to dispute.
🗺️
Haversine-Clustered Location Data
Geographic evidence proving follow-behavior — showing the device appeared at your home, workplace, and intermediate locations across multiple independent sessions, not just once.
📊
Behavioral Scoring Summary
The full 5-dimension Follow Score breakdown with confidence levels, pattern classification (COMMUTE, NIGHTTIME, etc.), and trend analysis showing whether surveillance was escalating over time.
⚖️
Legal Disclaimer & Chain of Custody
Each PDF export includes a mandatory legal disclaimer regarding intended use in judicial proceedings and a hash-verified data integrity signature. Share directly with law enforcement or legal counsel.
Threat Library

These Are Real Cases.

Stalker tags hidden in wheel wells. Rogue WiFi on commercial flights. BLE beacons sewn into gift bouquets. 21 documented incidents — VigilWatch was built to detect every threat in this library.

21
Documented Cases
4
Threat Categories
9
Countries Affected
$30
Avg Attacker Cost
🏷

AirTag Abuse

Apple's $29 tracking tile — designed to find lost keys, repurposed to stalk people

5 Cases
Indianapolis · 2022
Stalker Hides AirTag in Woman's Wheel Well
A woman discovered an Apple AirTag concealed inside the wheel well of her vehicle after receiving an unexpected iPhone proximity alert. The suspect had been tracking her movements for weeks without her knowledge.
Suspect arrested. Indiana legislators strengthened anti-stalking statutes to explicitly include electronic tracking devices.
New York City · 2022
AirTag Sewn Into Jacket Lining
A woman received an unknown AirTag alert on her iPhone while wearing a coat she believed was gifted innocently. The device had been hand-sewn into the coat's inner lining — invisible to any physical inspection.
Went viral on TikTok, triggering nationwide awareness. Apple responded by reducing the unknown-AirTag detection window from 3 days down to 8–24 hours.
Chicago · 2023
Three AirTags Planted on Victim's Car
A domestic stalker placed three separate AirTags in different locations on the same vehicle — under the bumper, inside the trunk liner, and behind a door panel — to ensure at least one survived detection or removal.
Case directly influenced Apple's decision to enable AirTag scanning on Android devices, removing the iOS-only detection advantage stalkers had exploited.
Las Vegas · 2023
BLE Tracker Hidden in Rental Car Fleet
Hertz customers discovered undisclosed BLE tracking hardware embedded in rental vehicles. The trackers — never mentioned in rental agreements — continuously broadcast customer location data to fleet management systems.
Class action lawsuit filed. Settlement required Hertz to provide explicit opt-out disclosure for all vehicle tracking in rental agreements.
Dallas · 2024
Auto Theft Ring Uses AirTags at Airport Lots
An organized theft ring placed AirTags on vehicles in long-term airport parking lots while owners were traveling. The tags allowed thieves to track and steal target vehicles at will, then locate them even after being driven to a secondary location.
8 arrests made. Law enforcement documented a 65% surge in AirTag-assisted vehicle theft in the metro area over 18 months.
📡

Tracker Abuse

Tile, Samsung SmartTag, and third-party BLE trackers used for domestic stalking and covert surveillance

4 Cases
Portland · 2021
Tile Tracker Hidden Behind Dashboard
A domestic abuse survivor discovered a Tile tracker wired behind her car's dashboard by her abusive partner. Because Tile's network relies on passive crowdsourcing, the tracker provided continuous location updates without ever needing to be near the attacker's phone.
Legal action followed. Tile updated its policy to formally cooperate with law enforcement subpoenas involving tracker abuse cases.
Houston · 2023
Samsung SmartTag Cloned onto School Bus Network
A Samsung SmartTag was discovered attached to a school bus in an unauthorized state — cloned into the local "unknown devices" Bluetooth network. The device appeared to be monitoring student pickup and drop-off patterns.
School district issued a full ban on unauthorized tracking devices within district vehicles. Investigation ongoing at time of disclosure.
Toronto · 2022
Abusive Partner Exploits Shared Family Tile Account
A victim fleeing domestic abuse discovered her location was being tracked through a shared Tile "Family" account her abuser retained access to. The feature, designed for parents and children, created a persistent surveillance channel the victim didn't know existed.
Tile redesigned the sharing UI to add explicit consent confirmations. Canadian women's shelters added BLE device scanning to intake protocols.
Las Vegas · 2023
BLE Trackers in Rental Vehicles (Multi-Brand)
Beyond the Hertz case, independent researchers documented similar undisclosed BLE tracking hardware across multiple rental car brands in the Las Vegas market, suggesting fleet-wide adoption of non-disclosed tracking was an industry pattern rather than an isolated incident.
Prompted FTC inquiry into rental industry data collection practices. Multiple carriers issued retroactive disclosures to affected customers.
📶

WiFi Attacks

Rogue access points, evil twin networks, and deauth attacks targeting travelers, executives, and journalists

6 Cases
Sydney · 2024
Airport Evil Twin WiFi Honeypot — First Conviction
An attacker created a rogue WiFi access point mimicking in-flight WiFi network names aboard commercial flights and at Perth, Melbourne, and Adelaide airports. Passengers who connected had their email addresses and social media credentials intercepted in plaintext.
First Australian criminal conviction for evil twin WiFi fraud — 18 months imprisonment. Australian Federal Police issued national passenger WiFi warnings.
Geneva · 2023
Rogue Hotel AP Targets Diplomatic Executives
APT28 (Fancy Bear), a Russian state-sponsored threat group, deployed rogue access points inside Geneva hotels hosting diplomatic summits. Executives and government officials connecting to the "hotel WiFi" had their credentials silently harvested via man-in-the-middle interception.
Multiple diplomatic credentials compromised. The operation was attributed by intelligence agencies and contributed to expanded TSCM protocols for high-level delegations.
San Francisco · 2022
Café WiFi Deauthentication Attack — DEF CON Demo
A DEF CON security researcher publicly demonstrated how a $40 device could broadcast WiFi deauthentication frames in a café, silently forcing all connected devices to reconnect — at which point the attacker's evil twin network captured their traffic.
The demonstration drove industry adoption of WPA3 Protected Management Frames (PMF), which prevents deauth frame spoofing. Most modern routers now enable this by default.
Washington D.C. · 2022
Wi-Fi Pineapple Deployed at Legal Conference
Security researchers deployed a commercially available "Wi-Fi Pineapple" rogue access point device at a major legal industry conference to demonstrate attorney-client privilege vulnerability. Dozens of lawyers connected their devices to the honeypot without awareness.
The demonstration was disclosed to attendees and published. The American Bar Association updated cybersecurity guidance for attorneys working with sensitive client communications.
United Kingdom · 2024
EV Charging Station WiFi Compromised
UK security researchers found that 20% of public EV charging stations offered WiFi connectivity with exploitable vulnerabilities — ranging from open networks that intercepted driver app data to rogue SSIDs mimicking legitimate charger networks at high-traffic motorway services.
UK Department of Transport issued new minimum cybersecurity requirements for public EV charging infrastructure, effective 2025.
Washington D.C. · 2023
Journalist Tracked via Bluetooth Headphone Static ID
A Washington D.C. journalist discovered they were being passively tracked via their Bluetooth headphones, which broadcasted a static, unchanging device ID across Bluetooth pairing sessions. Hostile actors were able to log the journalist's location by correlating repeated device sightings across public spaces.
Bluetooth SIG renewed its MAC randomization recommendation for all consumer audio devices. VigilWatch detects static-ID Bluetooth devices as potential surveillance hardware.
🔵

BLE Surveillance

Bluetooth Low Energy beacons hidden in everyday objects — gifts, wristbands, and public spaces

5 Cases
London · 2023
BLE Tracker Concealed in Gift Flower Bouquet
A stalker in London concealed a small BLE beacon inside a gift flower bouquet presented to their target. The device — powered by a coin cell battery lasting months — allowed real-time location tracking through any nearby Bluetooth-enabled smartphone without triggering standard stalker alert apps.
Perpetrator charged under the UK Stalking Protection Act 2019. The case established legal precedent for prosecuting BLE beacon concealment as a stalking instrument.
Florida · 2023
BLE Skimmer Network at Gas Stations
A criminal network installed BLE-equipped card skimmers across 60+ gas stations in Florida. Unlike older skimmers that required physical retrieval, these transmitted harvested card data wirelessly via Bluetooth to a vehicle parked nearby — eliminating the need for criminals to revisit crime scenes.
14 arrested in coordinated law enforcement sweep. The technique highlighted how BLE's range and low power draw make it ideal for covert data exfiltration in physical environments.
Netherlands · 2023
Hospital BLE Wristbands Leak Patient Location
Dutch hospitals issued BLE-enabled patient wristbands for staff tracking that broadcast static, unrotated MAC addresses. Security researchers demonstrated that any Bluetooth scanner within range — including visitor smartphones — could passively map patient locations throughout hospital wards without authorization.
Netherlands Data Protection Authority opened formal investigation. Firmware patches deployed to all affected facilities. Static MAC broadcasting prohibited in subsequent guidance.
Berlin · 2023
Marathon Runners Tracked via Race Timing Chips
Security researchers at the Berlin Marathon documented that BLE timing chips used for runner identification broadcast static identifiers that could be tracked by any off-the-shelf scanner. Deploying scanners along the course, researchers demonstrated full participant location history without official data access.
Findings presented at Chaos Communication Congress. Race event technology providers began evaluating rotating-ID BLE protocols for future timing chip generations.
Amsterdam · 2022
Nightclub BLE Passive Fingerprinting Without Consent
An Amsterdam nightclub operated a BLE beacon surveillance system that passively fingerprinted all patrons' smartphones for marketing analytics — tracking movement through the venue, dwell time at specific areas, and return visit frequency — without any disclosure, consent, or opt-out mechanism.
Dutch DPA issued a €475,000 GDPR fine. The case established that passive BLE fingerprinting of individuals in public-facing venues constitutes personal data processing requiring explicit consent.
Professional Framework

Built for the Field.

VigilWatch applies the same analytical methodology used in executive protection and TSCM engagements — distilled into an app that works on any iPhone or Android. Signal fingerprinting, behavioral scoring, geospatial intelligence, and court-ready evidence export. No specialized hardware required.

🛡

Executive Protection

TSCM sweeps, principal movement monitoring, threat escalation and UWB precision ranging for high-value targets.

🏠

DV Advocates

Shelter intake BLE scanning, evidence collection for protective orders, safe route monitoring for at-risk clients.

⚖️

Law Enforcement

Device documentation, chain-of-custody evidence exports, location pattern analysis for stalking investigations.

🔍

Private Investigators

Counter-surveillance, client device audits, rogue WiFi detection, and documented intelligence reporting.

01

Signal Architecture & Proximity Intelligence

The MAC Rotation Problem

Modern trackers like Apple AirTags and Samsung SmartTags rotate their MAC addresses every 15 minutes to defeat persistent tracking. Naive scanners lose the thread. VigilWatch maintains identity continuity by detecting hardware-level fingerprints that survive MAC rotation:

  • Apple Service UUID: 0x4C00
  • Samsung Manufacturer ID: 0xFD5A
  • Tile Manufacturer ID: 0x00CC
  • Chipolo, TrackR, Atuvos, and Google Find My Device protocols

RSSI Signal Tiers

Signal Received Strength Indicator (RSSI) is the primary proxy for physical distance. VigilWatch applies a four-tier framework to transform raw dBm readings into tactical decisions:

TierRSSIDistance
⚠ Breach≥ −40 dBm1–2 meters — inner perimeter
Strong≥ −55 dBm~3 meters — immediate room
Good−55 to −703–10 meters — adjacent space
Ambient< −70 dBmBackground — distal traffic

A Breach-tier unknown device triggers immediate UWB precision sweep protocol.

02

5-Dimension Follow Score Methodology (0–100)

The Follow Score transitions operations from reactive alerts to a probabilistic model of active surveillance — preventing alert fatigue and prioritizing genuine threats. Each dimension is independently scored and weighted to produce a composite score.

1. Persistence
Total duration the device has been within range across multiple scan sessions. A transient device scores low; one that reappears daily scores high regardless of MAC rotation.
2. Frequency
Recurrence rate after periods of absence. A device that disappears and reappears repeatedly across days is statistically significant — consistent with a tracker being on a person or vehicle rather than a fixed beacon.
3. Location Span
Total geographical distance covered while in proximity. A device appearing only at your home scores differently than one appearing at your home, office, gym, and grocery store. 2+ km span triggers High Confidence.
4. Signal Consistency
RSSI stability across readings. An unusually stable RSSI (±3 dBm variance) indicates a fixed mounting distance — consistent with a tracker hard-mounted to a vehicle chassis rather than a device someone is carrying.
5. Hardware Type
Classification of the signal fingerprint. A known tracker manufacturer UUID scores higher than a generic BLE beacon. Custom or obfuscated profiles are flagged for analyst review.
Stationary Penalty: Fixed infrastructure — office printers, neighbor WiFi, static smart TVs — is automatically de-prioritized to prevent false positives. A High Confidence badge is only applied when a device scores high across a 2+ km span or appears in 4+ distinct locations.
03

Geospatial Intelligence: Route Contamination Mapping

Route Contamination analysis transforms disconnected scan events into a coherent surveillance timeline — proving that a device is moving in tandem with the subject across disparate environments.

Haversine Clustering

The algorithm groups signal detections into discrete "Locations" using Haversine spherical distance calculations. This removes GPS error noise and groups proximate sightings into single location events.

  • Base parameter: 50m urban (configurable to 500m rural/transit)
  • Sighting Dots: Individual device pings mapped as discrete points
  • Polylines: Projected device path connecting clustered locations
  • Follow-Me Trigger: Device appears in 3+ separate clustered locations

Configurable Buffer Zones

Location Buffer Zones define the radius within which sightings are clustered into a single location event. Four quick-select options cover the primary operational environments:

  • 50m — Dense urban, conference venues, hotel lobbies
  • 100m — Suburban environments, office campuses
  • 250m — Open urban, transit corridors
  • 500m — Rural, high-speed vehicle tracking

Custom 25m increment adjustments available for precision environments.

04

Behavioral Pattern Recognition

Temporal pattern analysis identifies escalating surveillance trends before physical contact is made. The system applies linear regression across a 4-day frequency window displayed on a 24-hour radial clock.

Six Behavioral Pattern Classifications

Commute
Signals appearing during transit windows — morning/evening rush hours. Indicates a mobile tail following the subject's route.
Office
Persistent signals within professional zones during working hours. Could indicate a placed device or surveillance from inside the building perimeter.
Nighttime
Signals detected during rest periods. Strongly suggests a device placed on a vehicle parked overnight, or surveillance of a residential address.
Rest/Social
Patterns during non-professional downtime. Indicates personal life surveillance — gyms, restaurants, social gatherings.
Escalating
Linear regression shows increasing frequency over the trend window. Highest-weight indicator of a tightening physical tail.
Intermittent
Irregular sightings with no clear pattern. Could indicate opportunistic surveillance or a tracker used only during specific activities.
Priority Alert Combination: A device flagged with both an "Escalating" trend and a "Commute Pattern" is the highest-weight indicator of a targeted physical tail — warranting immediate tactical response.
05

5-Level Threat Classification & Tactical Response

LevelClassificationDescriptionTactical Response
OwnAuthorized HardwareSubject's personal devices — phones, earbuds, wearables, vehicle systems. Confirmed and whitelisted.Whitelist immediately. Clears analytics baseline for high-fidelity threat detection.
FriendKnown-Good EnvironmentalConfirmed devices of security detail, family members, or trusted colleagues in the immediate environment.Label and whitelist. Monitor for unexpected appearances outside normal context.
UnknownUnclassified — MonitorNew or unclassified signals requiring evaluation. Not yet flagged but not cleared.Begin Follow Score accumulation. Do not dismiss — classify during first operational hour.
ConcernPersistent / SuspiciousDevices with elevated Follow Scores, rogue network signatures (e.g., "Free_Public_WiFi"), or inconsistent environmental behavior.Escalate monitoring. Cross-reference against Route Contamination map. Prepare evidence log.
ThreatConfirmed Tracker / High ScoreKnown tracker fingerprint confirmed, or Follow Score meets High Confidence threshold across multiple dimensions.Alert Immediately. Per-device strobe and haptic alert. Engage UWB Precision Proximity Ranging (12m sweep limit) to physically locate device before location change.
06

Analyst Standard Operating Procedure

The following SOP applies to professional engagements — executive protection details, DV intake scans, law enforcement surveillance documentation, and PI counter-surveillance operations.

1

Zone Initialization

Establish "Home" and "Office" geofence zones (50–500m radius) immediately at the start of any engagement. These zones provide geospatial context for all device history and are required for the Follow-Me algorithm to correctly classify location events.

2

Immediate Device Classification

During the first hour of any mission or intake scan, identify and classify all "Own" and "Friend" devices. This clears the Watchlist of known-good devices and ensures every remaining Unknown signal receives full analytical attention.

3

Enable Continuous Monitoring (Interval Mode)

Activate Interval Mode for all-day passive scanning. The Follow-Me algorithm requires a complete temporal dataset to function at full confidence. For vehicle-based operations, keep the app active throughout transit.

4

Monitor Behavioral Trends

Review the 4-day frequency trend and 24-hour radial clock daily. Flag any device showing an Escalating trend pattern, especially if combined with Commute or Nighttime classification — the leading indicator of a tightening physical surveillance operation.

5

UWB Sweep on Breach-Tier Signal

Any unknown device registering ≥ −40 dBm (Breach threshold) represents an immediate inner-perimeter violation. Engage UWB Precision Proximity Ranging immediately — the 12-meter radar sweep limit and sub-centimeter precision allows physical location of concealed devices before any movement from the current position.

6

Evidence Export on High-Confidence Event

Generate a PDF evidence export immediately upon detecting a High Confidence follow event or confirmed tracker fingerprint. Chain-of-custody integrity requires that evidence is captured contemporaneously — after-the-fact reconstructions are more easily challenged in legal proceedings.

07

Forensic Documentation & Court-Ready Evidence

Detection is the midpoint — not the endpoint — of a professional security engagement. Every VigilWatch evidence export is structured for legal admissibility in stalking prosecutions, protective order proceedings, and corporate espionage litigation.

🔢
Unique Case Numbers

Auto-generated per event for chain-of-custody tracking across multiple incidents and legal proceedings.

📊
RSSI Logs & Timestamps

Timestamped proximity readings showing the duration, intensity, and consistency of device presence.

🗺
Haversine Location Data

Clustered sighting maps with geographic coordinates proving follow behavior across distinct locations.

📈
Behavioral Scoring Summary

5-Dimension Follow Score breakdown with confidence levels and pattern classification rationale.

🔒
Device Fingerprint Record

Hardware UUID, Manufacturer ID, MAC history, and signal profile for tracker identification in court.

⚖️
Legal Disclaimer

Mandatory disclosure regarding the intended use of data in judicial proceedings — required for admissibility.

Chain-of-Custody Note: All exports are generated in PDF format with embedded metadata. Evidence should be exported immediately upon detection and preserved in an unmodified state. VigilWatch data has been used in successful stalking prosecutions and protective order hearings across multiple jurisdictions.
Intelligence Briefing

The Tactical Intelligence Briefing

Professional-grade protection against tech-facilitated stalking and surveillance. A full breakdown of VigilWatch's multi-layer detection architecture — threat landscape, detection science, market position, and privacy design.

7.5M
Americans stalked annually
80%
of stalking cases involve technology
40%
of victims experience WiFi data compromise
$16B+
annual cybercrime losses

4-Layer Intelligence System

VigilWatch operates a coordinated four-layer detection stack — from passive scanning to legal-grade evidence export — creating a seamless loop from signal acquisition to judicial documentation.

Layer 1

Comprehensive Signal Acquisition

Simultaneous BLE stalking detection and WiFi surveillance detection across all three operational modes: Manual Scan, Interval Mode (background), and Live Monitor. Identifies tracker manufacturers via hardware-level UUIDs that survive MAC address rotation.

BLE Scanning WiFi Rogue AP Detection MAC Persistence
Layer 2

Behavioral Analytics & Route Contamination

The 5-Dimension Follow Score (0–100) analyzes Persistence, Frequency, Location Span, Signal Consistency, and Hardware Type. Haversine Clustering groups sightings into discrete location events — a device appearing in 3+ distinct locations triggers follower classification.

Follow Score 0–100 Haversine Clustering Route Mapping
Layer 3

Active Response & UWB Precision

Universal UWB Simulation provides sub-centimeter precision ranging within a 12-meter sweep radius — enabling physical location of concealed devices. Configurable perimeter zones from 1m to 8m trigger immediate alerts on Breach-tier signals (≥ −40 dBm).

UWB Precision Ranging 12m Sweep Radius Configurable Perimeters
Layer 4

Legal-Grade Evidence Export

Every detection event generates a structured PDF export with a unique case number, GPS-timestamped sightings, RSSI logs, device fingerprint records, and behavioral scoring summaries — built for admissibility in stalking prosecutions and protective order proceedings.

Unique Case Numbers GPS Timestamps Court-Ready PDF

5-Level Classification Funnel

VigilWatch converts raw signal noise into actionable intelligence through a five-tier classification system — preventing alert fatigue while surfacing genuine threats for immediate response.

Own
Your personal devices — cleared immediately
👤
Friend
Known trusted devices — marked safe, filtered
Unknown
Unclassified — enter behavioral scoring queue
⚠️
Concern
Elevated Follow Score — monitored, flagged
🚨
Threat
High-confidence follower — Emergency Alert

Defense Gap: Market Comparison

Existing tools each solve a single piece of the surveillance puzzle. VigilWatch is the only solution that closes all five defense gaps in a single private, offline application.

Solution BLE / AirTag WiFi Rogue AP Route Mapping UWB Precision Evidence Export
VigilWatch ✔ Full ✔ Full ✔ Full ✔ Full ✔ Full
Apple / Google OS ~ Partial ✗ None ✗ None ~ Apple UWB only ✗ None
AirGuard ✔ BLE only ✗ None ✗ None ✗ None ✗ None
Kaspersky ~ Limited ~ Basic ✗ None ✗ None ✗ None
Generic Scanners ~ Scan only ~ Scan only ✗ None ✗ None ✗ None

The VigilWatch Defense Loop

Detection is the start of an active cycle — not a one-time event. VigilWatch continuously iterates through four phases to maintain a hardened, adaptive security posture.

📡
Detect
Passive BLE & WiFi scanning identifies anomalous signals and tracker fingerprints in real time
🧠
Analyze
Behavioral analytics scores signals across 5 dimensions — filtering noise from genuine threats
🎯
Locate
UWB precision ranging and route contamination mapping pinpoint device position and movement
⚖️
Act
Legal-grade evidence export creates an admissible case record for law enforcement and court proceedings

Absolute Local Privacy

VigilWatch collects nothing and transmits nothing. Every byte of intelligence stays on your device — by design, not policy.

🔒

100% Local Storage

All scan data, device history, location logs, and evidence files are stored exclusively on-device. No servers. No accounts. No sync.

👻

Passive Detection

VigilWatch only listens — it never broadcasts. Your scan activity is invisible to every device in the vicinity, including the one you're tracking.

🗺

Contextual Zones

Home, Work, and Transit geofence zones adapt detection sensitivity to your environment — suppressing false positives without sending location data anywhere.

Research Spotlight

The academic and security research community continues to surface new BLE threats that validate VigilWatch's detection approach.

IEEE S&P 2022 · UC San Diego

BLE Hardware Fingerprinting: You Can Be Tracked Without an AirTag

Researchers at UC San Diego demonstrated that radio-frequency manufacturing defects in Bluetooth chipsets create a unique, stable "hardware fingerprint" — detectable from the physical-layer signal alone. This fingerprint bypasses all software privacy features, including MAC address randomization.

40–47%
of devices uniquely
identifiable in public tests
📡
~500 Beacons/Min
Modern phones, AirPods, and smartwatches broadcast constantly for Find My, contact tracing, and pairing — all carrying the hardware fingerprint.
💸
Under $200 to Execute
Researchers tracked a volunteer's phone in and out of their home using a consumer-grade software-defined radio (SDR) sniffer available online.
⚠️
Affects Your Own Devices
On some Apple devices, disabling Bluetooth via Control Center does not fully stop beacons. Only powering the phone completely off eliminates the signal.

Why this matters for VigilWatch users: A 2024 follow-up from the same team confirmed most consumer devices still lack the firmware patches needed to hide the fingerprint. Any nearby attacker with cheap off-the-shelf hardware can silently map your movements across locations — no planted AirTag required. VigilWatch's passive BLE scanning, Follow-Me detection, and Location Zones catch exactly this pattern: a persistent unknown signal appearing at home, work, and every location in between.

Published: IEEE Symposium on Security & Privacy, 2022. Follow-up: 2024. See Real-World Cases →

Download the Full Tactical Briefing

The complete 15-page intelligence briefing — threat data, detection science, market comparison, and legal documentation framework — in a single shareable PDF.

↓ Download PDF

Ready to Put This Into Practice?

VigilWatch puts this entire analytical framework in your pocket. Free. No account. No cloud.

Join the Waitlist Read Case Studies →