Professional Framework

Built for the Field.

VigilWatch applies the same analytical methodology used in executive protection and TSCM engagements — distilled into an app that works on any iPhone or Android. Signal fingerprinting, behavioral scoring, geospatial intelligence, and court-ready evidence export. No specialized hardware required.

🛡

Executive Protection

TSCM sweeps, principal movement monitoring, threat escalation and UWB precision ranging for high-value targets.

🏠

DV Advocates

Shelter intake BLE scanning, evidence collection for protective orders, safe route monitoring for at-risk clients.

⚖️

Law Enforcement

Device documentation, chain-of-custody evidence exports, location pattern analysis for stalking investigations.

🔍

Private Investigators

Counter-surveillance, client device audits, rogue WiFi detection, and documented intelligence reporting.

01

Signal Architecture & Proximity Intelligence

The MAC Rotation Problem

Modern trackers like Apple AirTags and Samsung SmartTags rotate their MAC addresses every 15 minutes to defeat persistent tracking. Naive scanners lose the thread. VigilWatch maintains identity continuity by detecting hardware-level fingerprints that survive MAC rotation:

  • Apple Service UUID: 0x4C00
  • Samsung Manufacturer ID: 0xFD5A
  • Tile Manufacturer ID: 0x00CC
  • Chipolo, TrackR, Atuvos, and Google Find My Device protocols

RSSI Signal Tiers

Signal Received Strength Indicator (RSSI) is the primary proxy for physical distance. VigilWatch applies a four-tier framework to transform raw dBm readings into tactical decisions:

TierRSSIDistance
⚠ Breach≥ −40 dBm1–2 meters — inner perimeter
Strong≥ −55 dBm~3 meters — immediate room
Good−55 to −703–10 meters — adjacent space
Ambient< −70 dBmBackground — distal traffic

A Breach-tier unknown device triggers immediate UWB precision sweep protocol.

02

5-Dimension Follow Score Methodology (0–100)

The Follow Score transitions operations from reactive alerts to a probabilistic model of active surveillance — preventing alert fatigue and prioritizing genuine threats. Each dimension is independently scored and weighted to produce a composite score.

1. Persistence
Total duration the device has been within range across multiple scan sessions. A transient device scores low; one that reappears daily scores high regardless of MAC rotation.
2. Frequency
Recurrence rate after periods of absence. A device that disappears and reappears repeatedly across days is statistically significant — consistent with a tracker being on a person or vehicle rather than a fixed beacon.
3. Location Span
Total geographical distance covered while in proximity. A device appearing only at your home scores differently than one appearing at your home, office, gym, and grocery store. 2+ km span triggers High Confidence.
4. Signal Consistency
RSSI stability across readings. An unusually stable RSSI (±3 dBm variance) indicates a fixed mounting distance — consistent with a tracker hard-mounted to a vehicle chassis rather than a device someone is carrying.
5. Hardware Type
Classification of the signal fingerprint. A known tracker manufacturer UUID scores higher than a generic BLE beacon. Custom or obfuscated profiles are flagged for analyst review.
Stationary Penalty: Fixed infrastructure — office printers, neighbor WiFi, static smart TVs — is automatically de-prioritized to prevent false positives. A High Confidence badge is only applied when a device scores high across a 2+ km span or appears in 4+ distinct locations. The probability of coincidental match across these dimensions is statistically negligible.
03

Geospatial Intelligence: Route Contamination Mapping

Route Contamination analysis transforms disconnected scan events into a coherent surveillance timeline — proving that a device is moving in tandem with the subject across disparate environments.

Haversine Clustering

The algorithm groups signal detections into discrete "Locations" using Haversine spherical distance calculations. This removes GPS error noise and groups proximate sightings into single location events.

  • Base parameter: 50m urban (configurable to 500m rural/transit)
  • Sighting Dots: Individual device pings mapped as discrete points
  • Polylines: Projected device path connecting clustered locations
  • Follow-Me Trigger: Device appears in 3+ separate clustered locations

Configurable Buffers

Location Buffer Zones define the radius within which sightings are clustered into a single location event. Four quick-select options cover the primary operational environments:

  • 50m — Dense urban, conference venues, hotel lobbies
  • 100m — Suburban environments, office campuses
  • 250m — Open urban, transit corridors
  • 500m — Rural, high-speed vehicle tracking

Custom 25m increment adjustments available for precision environments.

04

Behavioral Pattern Recognition

Temporal pattern analysis identifies escalating surveillance trends before physical contact is made. The system applies linear regression across a 4-day frequency window displayed on a 24-hour radial clock.

Six Behavioral Pattern Classifications

Commute
Signals appearing during transit windows — morning/evening rush hours. Indicates a mobile tail following the subject's route.
Office
Persistent signals within professional zones during working hours. Could indicate a placed device or surveillance from inside the building perimeter.
Nighttime
Signals detected during rest periods. Strongly suggests a device placed on a vehicle parked overnight, or surveillance of a residential address.
Rest/Social
Patterns during non-professional downtime. Indicates personal life surveillance — gyms, restaurants, social gatherings.
Escalating
Linear regression shows increasing frequency over the trend window. Highest-weight indicator of a tightening physical tail.
Intermittent
Irregular sightings with no clear pattern. Could indicate opportunistic surveillance or a tracker used only during specific activities.
Priority Alert Combination: A device flagged with both an "Escalating" trend and a "Commute Pattern" is the highest-weight indicator of a targeted physical tail. This suggests the adversary is tightening their gap or increasing follow frequency — warranting immediate tactical response.
05

5-Level Threat Classification & Tactical Response

Level Classification Description Tactical Response
Own Authorized Hardware Subject's personal devices — phones, earbuds, wearables, vehicle systems. Confirmed and whitelisted. Whitelist immediately. Clears analytics baseline for high-fidelity threat detection.
Friend Known-Good Environmental Confirmed devices of security detail, family members, or trusted colleagues in the immediate environment. Label and whitelist. Monitor for unexpected appearances outside normal context.
Unknown Unclassified — Monitor New or unclassified signals requiring evaluation. Not yet flagged but not cleared. Begin Follow Score accumulation. Do not dismiss — classify during first operational hour.
Concern Persistent / Suspicious Devices with elevated Follow Scores, rogue network signatures (e.g., "Free_Public_WiFi"), or inconsistent environmental behavior. Escalate monitoring. Cross-reference against Route Contamination map. Prepare evidence log.
Threat Confirmed Tracker / High Score Known tracker fingerprint confirmed, or Follow Score meets High Confidence threshold across multiple dimensions. Alert Immediately. Per-device strobe and haptic alert. Engage UWB Precision Proximity Ranging (12m sweep limit, sub-centimeter precision) to physically locate device before location change.
06

Analyst Standard Operating Procedure

The following SOP applies to professional engagements — executive protection details, DV intake scans, law enforcement surveillance documentation, and PI counter-surveillance operations.

1

Zone Initialization

Establish "Home" and "Office" geofence zones (50–500m radius) immediately at the start of any engagement. These zones provide geospatial context for all device history and are required for the Follow-Me algorithm to correctly classify location events. Without zone initialization, all sightings are classified as generic ambient traffic.

2

Immediate Device Classification

During the first hour of any mission or intake scan, identify and classify all "Own" and "Friend" devices. This clears the Watchlist of known-good devices and ensures every remaining Unknown signal receives full analytical attention. Skipping this step will generate false positives and inflate alert volume.

3

Enable Continuous Monitoring (Interval Mode)

Activate Interval Mode for all-day passive scanning. The Follow-Me algorithm requires a complete temporal dataset to function at full confidence — gap-filled data reduces the accuracy of Persistence and Frequency scoring. For vehicle-based operations, keep the app active throughout transit.

4

Monitor Behavioral Trends

Review the 4-day frequency trend and 24-hour radial clock daily. Flag any device showing an Escalating trend pattern, especially if combined with Commute or Nighttime classification. This combination is the leading indicator of a tightening physical surveillance operation.

5

UWB Sweep on Breach-Tier Signal

Any unknown device registering ≥ −40 dBm (Breach threshold) represents an immediate inner-perimeter violation — the hardware is physically adjacent to the subject. Engage UWB Precision Proximity Ranging immediately. The 12-meter radar sweep limit and sub-centimeter precision allows physical location of concealed devices before any movement from the current position.

6

Evidence Export on High-Confidence Event

Generate a PDF evidence export immediately upon detecting a High Confidence follow event or confirmed tracker fingerprint. Chain-of-custody integrity requires that evidence is captured contemporaneously — after-the-fact reconstructions are more easily challenged in legal proceedings. Export at detection, not at report preparation.

07

Forensic Documentation & Court-Ready Evidence

Detection is the midpoint — not the endpoint — of a professional security engagement. Every VigilWatch evidence export is structured for legal admissibility in stalking prosecutions, protective order proceedings, and corporate espionage litigation.

🔢
Unique Case Numbers

Auto-generated per event for chain-of-custody tracking across multiple incidents and legal proceedings.

📊
RSSI Logs & Timestamps

Timestamped proximity readings showing the duration, intensity, and consistency of device presence.

🗺
Haversine Location Data

Clustered sighting maps with geographic coordinates proving follow behavior across distinct locations.

📈
Behavioral Scoring Summary

5-Dimension Follow Score breakdown with confidence levels and pattern classification rationale.

🔒
Device Fingerprint Record

Hardware UUID, Manufacturer ID, MAC history, and signal profile for tracker identification in court.

⚖️
Legal Disclaimer

Mandatory disclosure regarding the intended use of data in judicial proceedings — required for admissibility.

Chain-of-Custody Note: All exports are generated in PDF format with embedded metadata. Evidence should be exported immediately upon detection and preserved in an unmodified state. VigilWatch data has been used in successful stalking prosecutions and protective order hearings across multiple jurisdictions.
Professional-Grade Detection

Ready to Run the Framework?

VigilWatch puts the full TSCM analytical stack — signal fingerprinting, behavioral scoring, geospatial mapping, forensic export — on a standard smartphone. No specialized hardware. No per-seat licensing. Free for public access during early release.

Join the Waitlist Technical Deep Dive