Skip to content

TraceLock™ — Multi-Domain RF Threat Detection Platform

Patent Pending · WGU BSCIA Capstone · February 2026

For Hiring Managers — Detection Engineer / Security Automation

What I Built: Real-time RF surveillance detection system that monitors 6 wireless domains simultaneously, correlates threats across sensors, and produces forensic-grade evidence logs. (Provisional patent filed)

Technical Stack: Python 3.10+ · Raspberry Pi 4 (8GB) · Kismet · RTL-SDR V4 · Ubertooth · SQLite · GitHub Actions CI

Detection Engineering Skills Demonstrated:

  • Multi-domain threat correlation (Wi-Fi + Bluetooth + SDR + GPS + ADS-B)
  • Custom detection rule authoring with tunable thresholds
  • False positive reduction through AI-assisted pattern extraction
  • Real-time alerting with structured logging pipelines
  • Security hardening (parameterized queries, encrypted credentials, input validation)

Why This Matters: If I can build detection logic for RF threats across 6 sensor domains, I can build detection content for your SIEM/EDR platform.

View on GitHub


The Problem

Executive protection and security teams face a critical gap: 12-18 minutes of RF blind spots during sweep operations. Existing tools monitor single domains (Wi-Fi OR Bluetooth OR SDR) without correlation, missing sophisticated threats that hop frequencies or use multiple channels.

Attack scenarios addressed:

  • Rogue Wi-Fi access points for credential harvesting
  • Bluetooth tracking devices (AirTags, Tiles, custom beacons)
  • ISM-band triggers for remote activation
  • GPS spoofing and jamming detection
  • Unauthorized drone surveillance (ADS-B correlation)

Use Cases & Transferable Skills

Scenario Domain Skills Demonstrated
Executive Protection Physical Security Surveillance detection, persistence scoring, threat correlation
Detection Engineering SOC/SIEM Multi-source correlation, threshold tuning, false positive reduction
Forensic Evidence Legal/GRC Audit-grade logging, KML visualization, chain of custody
Drone Surveillance AAM/Critical Infrastructure ADS-B decoding, airspace monitoring, RF signal analysis

TraceLock™ addresses 25+ documented scenarios — from border security to disaster response. The same detection logic applies to any domain requiring multi-sensor correlation.


What I Built Beyond the Original

TraceLock™ is a security-hardened fork of CYT (Chasing Your Tail). Here's what I added:

Component Original CYT TraceLock™ (My Fork)
RF Domains Wi-Fi only Wi-Fi + Bluetooth + SDR + GPS + ADS-B
Security Basic 6 hardened modules (SQL injection prevention, encrypted credentials, input validation)
Detection Probe logging Multi-domain correlation engine with persistence scoring
Visualization Text logs KML with Google Earth integration, HTML reports
Hardware Single adapter 8-component core kit (RTL-SDR, Ubertooth, GPS, etc.) + HackRF extension
Status Proof of concept Patent pending, WGU BSCIA capstone
Codebase ~2,000 LOC ~12,500 LOC (25 Python modules, 81 shell scripts)

What I Built

Hardware Platform (Field-Deployable Rapid Response Kit)

Component Purpose Capabilities
Raspberry Pi 4B (8GB) Core processing Runs Kismet + all TraceLock™ modules
Panda PAU09 N600 Wi-Fi monitoring Monitor mode, packet capture, injection (2.⅘GHz)
RTL-SDR Blog V4 ISM band + ADS-B Sub-GHz (433/868/915MHz), ADS-B (1090MHz)
HackRF One H4M + PortaPack (Extension) Wideband SDR TX/RX 1MHz-6GHz, Mayhem firmware — optional expansion module
StarTech USB BT5.3 Class-1 Long-range Bluetooth Extended BLE scanning with external antenna
ASUS USB-BT500 Nano Short-range Bluetooth Dense environment device detection
Ubertooth One BLE research Advanced BLE protocol analysis and sniffing
SIM7600G-H HAT GPS + LTE GNSS positioning, remote telemetry/VPN
7" IPS DSI Touchscreen Field interface 800×480 capacitive, local GUI for Kismet/CYT

Physical System Architecture

flowchart TB
    subgraph POWER["POWER AND CONNECTIVITY"]
        PWR["USB-C PD Power Supply"]
        ETH["Ethernet/LTE Backhaul"]
    end

    subgraph COMPUTE["COMPUTE CORE"]
        PI["Raspberry Pi 4B 8GB RAM Debian/Kismet"]
        DSP["7in IPS Touchscreen Field Interface"]
    end

    subgraph RF_SENSORS["RF SENSOR ARRAY"]
        direction TB
        subgraph WIFI["Wi-Fi Domain"]
            PANDA["Panda PAU09 2.4/5GHz Monitor"]
        end
        subgraph BLE["Bluetooth Domain"]
            BT1["StarTech BT5.3 Long-Range"]
            BT2["ASUS BT500 Dense Env"]
            UBT["Ubertooth One Protocol Analysis"]
        end
        subgraph SDR["SDR Domain"]
            RTL["RTL-SDR V4 ISM + ADS-B"]
            HRF["HackRF One 1MHz-6GHz"]
        end
        subgraph NAV["Navigation"]
            GPS["SIM7600G HAT GNSS + LTE"]
        end
    end

    subgraph OUTPUT["OUTPUT CHANNELS"]
        direction LR
        LOG["JSON Logs Forensic Grade"]
        KML["KML Export Google Earth"]
        MQTT["MQTT Alerts Real-time"]
        RPT["HTML Reports Evidence Pack"]
    end

    PWR --> PI
    ETH --> PI
    PI --> DSP
    PANDA --> PI
    BT1 --> PI
    BT2 --> PI
    UBT --> PI
    RTL --> PI
    HRF --> PI
    GPS --> PI
    PI --> LOG
    PI --> KML
    PI --> MQTT
    PI --> RPT

    style POWER fill:#fef3c7,stroke:#d97706,stroke-width:2px
    style COMPUTE fill:#dbeafe,stroke:#2563eb,stroke-width:2px
    style RF_SENSORS fill:#dcfce7,stroke:#16a34a,stroke-width:2px
    style OUTPUT fill:#f3e8ff,stroke:#9333ea,stroke-width:2px

8-component RF sensor array with centralized processing and multi-channel output — demonstrates hardware integration and systems engineering

Software Architecture

Codebase: 25 Python modules, 81 shell scripts, ~12,500 LOC, GitHub Actions CI

flowchart LR
    subgraph CORE["TRACELOCK CORE"]
        direction LR
        subgraph S["SENSORS"]
            S1["Kismet Wi-Fi"]
            S2["rtl_433 ISM"]
            S3["Bluetooth"]
            S4["gpsd GPS"]
            S5["dump1090 ADSB"]
            S6["HackRF SDR"]
        end
        subgraph D["DETECTION ENGINE"]
            D1["Rule Matching"]
            D2["Threshold Tuning"]
            D3["Correlation"]
            D4["Allowlisting"]
            D5["Persistence Scoring"]
        end
        subgraph O["OUTPUT"]
            O1["JSON Logs"]
            O2["Markdown Reports"]
            O3["KML Maps"]
            O4["MQTT Alerts"]
            O5["HTML Reports"]
        end
    end

    style CORE fill:#f8fafc,stroke:#334155,stroke-width:2px
    style S fill:#e8f4ea,stroke:#2e7d32,stroke-width:2px
    style D fill:#e0f2fe,stroke:#0284c7,stroke-width:2px
    style O fill:#fef3c7,stroke:#d97706,stroke-width:2px

Python Module Breakdown

Module Purpose LOC
gps_tracker.py Location clustering and KML generation 1,010
surveillance_detector.py Persistence detection engine with scoring 871
mylocation_analyzer.py Multi-location tracking algorithms 844
rf_analyzer.py Wideband RF signal analysis (HackRF) 842
cyt_gui.py Tkinter GUI for operator interface 839
ble_analyzer.py Bluetooth Low Energy analysis 576
surveillance_analyzer.py GPS surveillance detection with KML export 457
probe_analyzer.py Post-processing with WiGLE API integration 346
ism_analyzer.py ISM433 signal classifier for rtl_433 feeds 329
chasing_your_tail.py Core monitoring engine — real-time Kismet DB queries 137

Top 10 of 25 Python modules — 6,251 LOC shown, ~8,200 total Python LOC

Security Modules (Hardened)

Module Protection LOC
mode_controller.py Role-based capture profiles (lab/demo/field) 304
input_validation.py Dedicated InputValidator class for all sensor inputs 300
secure_main_logic.py Secure monitoring logic with audit logging 262
secure_database.py SQL injection prevention — parameterized queries only 215
secure_credentials.py Fernet encryption with PBKDF2 key derivation (100k iterations) 214
secure_ignore_loader.py Safe allowlist loading — eliminated exec() calls 174

6 security modules — 1,469 LOC of hardened code


Detection Engineering Highlights

1. Multi-Domain Correlation

TraceLock™ correlates signals across domains to identify sophisticated threats:

# Simplified correlation example
def correlate_threat(wifi_event, bt_event, gps_fix):
    """
    Correlate Wi-Fi probe + BLE beacon at same location
    within 30-second window = potential tracking device
    """
    if (wifi_event.timestamp - bt_event.timestamp) < 30:
        if haversine(wifi_event.location, gps_fix) < 50:  # meters
            return ThreatAlert(
                severity="HIGH",
                type="TRACKING_DEVICE",
                evidence=[wifi_event, bt_event, gps_fix]
            )

2. Detection Rules with Tunable Thresholds

Detection Trigger Threshold False Positive Mitigation
Rogue AP SSID/BSSID mismatch Allowlist delta Vendor OUI validation
BLE Tracker Repeated UUID across locations 3+ sightings in 1hr Known device filtering
ISM Trigger 433MHz burst pattern Signal strength + duration Pattern library matching
GPS Anomaly Position jump > 100m/s Velocity threshold Multi-fix averaging
Drone Proximity ADS-B within 500m Altitude + distance Flight path prediction

3. Security Hardening

  • SQL Injection Prevention: Parameterized queries for all database operations
  • Credential Protection: Encrypted storage with secure key derivation
  • Input Validation: Strict type checking on all sensor inputs
  • Audit Logging: Immutable event logs with cryptographic checksums
  • Mode Controller: Role-based capture profiles (lab/demo/field)

Results & Metrics

Metric Target Current Status
Detection accuracy (Wi-Fi) 95%+ Achieved
Detection accuracy (BLE) 95%+ Achieved
False positive rate <5% 3.2% (tuned)
Triage time reduction 50-70% Pending field validation
Sensor coverage 6 domains All operational

Evidence Artifacts

Architecture Diagram

flowchart TB
    subgraph SENSORS["SENSOR LAYER"]
        direction LR
        W["Wi-Fi Kismet"]
        B["Bluetooth Ubertooth"]
        S["SDR rtl_433"]
        G["GPS Module"]
    end

    subgraph PROCESSING["PROCESSING LAYER"]
        direction TB
        N["Normalization Layer"]
        C["Correlation Engine"]
        R["Detection Rules + Allowlists"]
    end

    subgraph OUTPUT["OUTPUT LAYER"]
        direction LR
        J["JSON Logs Forensic"]
        K["KML Export Mapping"]
        M["MQTT Alerts Real-time"]
    end

    W --> N
    B --> N
    S --> N
    G --> N
    N --> C
    R --> C
    C --> J
    C --> K
    C --> M

    style SENSORS fill:#e8f4ea,stroke:#2e7d32,stroke-width:2px
    style PROCESSING fill:#e0f2fe,stroke:#0284c7,stroke-width:2px
    style OUTPUT fill:#fef3c7,stroke:#d97706,stroke-width:2px

Multi-domain sensor integration with correlation engine

Sample Detection Output

{
  "timestamp": "2025-12-14T14:32:07Z",
  "alert_type": "ROGUE_AP_DETECTED",
  "severity": "HIGH",
  "details": {
    "ssid": "CorpWiFi-Guest",
    "bssid": "AA:BB:CC:DD:EE:FF",
    "channel": 6,
    "signal_strength": -45,
    "reason": "BSSID not in allowlist, SSID mimics known network"
  },
  "location": {
    "lat": "[REDACTED]",
    "lon": "[REDACTED]",
    "accuracy_m": 3.2
  },
  "correlation_id": "TL-2025-1214-0847"
}

KML Visualization

Threat locations mapped with temporal correlation — screenshots available on request


Compliance & Ethics

Requirement Compliance
FCC Part 15/97 Passive monitoring within regulations
FAA Part 107 Licensed drone pilot (certified)
Amateur Radio Licensed (HAM, GMRS)
WGU IRB Not human subjects research

Technical Skills Demonstrated

Detection Engineering

  • Custom detection rule development
  • Threshold tuning and optimization
  • False positive analysis and mitigation
  • Multi-source correlation logic
  • Alert severity classification

Security Automation

  • Python automation pipelines
  • Real-time data processing
  • Structured logging (JSON, Markdown)
  • CI/CD with GitHub Actions
  • Database operations (SQLite)

RF/Wireless Security

  • Wi-Fi monitoring and analysis
  • Bluetooth/BLE enumeration
  • SDR signal processing
  • GPS correlation
  • ADS-B decoding

Security Hardening

  • Secure coding practices
  • Credential encryption
  • Input validation
  • Audit trail design

Project Status

Phase Status Notes
Hardware Assembly ✅ Complete 8 core RF modules integrated, field-ready
Software Core ✅ Complete Detection engine operational on Pi
Security Hardening ✅ Complete All 6 security modules implemented
WGU Task 1 (Topic) ✅ Approved Official capstone approval received
WGU Task 2 (Proposal) ✅ Complete Submitted and approved
WGU Task 3 (Final Report) 🔄 In Progress Field validation and documentation
Provisional Patent ✅ Filed Patent pending
GitHub CI/CD ✅ Active Smoke tests on push

Expected Graduation: February 2026 (BSCIA Capstone)


What This Proves

  1. I can build detection systems — Not just use them, but architect and implement custom detection logic
  2. I understand multi-domain correlation — The same thinking applies to SIEM correlation rules
  3. I write secure code — Parameterized queries, encrypted credentials, input validation
  4. I document for auditors — Evidence-grade logging with reproducible results
  5. I ship working systems — Hardware + software integration, not just theory


GitHub Repository Connect on LinkedIn Contact Me