Skip to content

TraceLock™ — Multi-Domain RF Threat Detection Platform

WGU BSCSIA Capstone · Degree Conferred March 2026

Role: Sole developer | Security-hardened fork | ~12,500 LOC (25 Python modules, 81 shell scripts) | 6 RF domains

For Hiring Managers — Detection Engineer / Security Automation

What I Built: Real-time RF surveillance detection system that monitors 6 wireless domains simultaneously, correlates threats across sensors, and produces forensic-grade evidence logs.

Technical Stack: Python 3.10+ · ARM SBC · Kismet · SDR Receivers · BLE Adapters · SQLite · GitHub Actions CI

Detection Engineering Skills Demonstrated:

  • Multi-domain threat correlation (Wi-Fi + Bluetooth + SDR + GPS + ADS-B)
  • Custom detection rule authoring with tunable thresholds
  • False positive reduction through AI-assisted pattern extraction
  • Real-time alerting with structured logging pipelines
  • Security hardening (parameterized queries, encrypted credentials, input validation)

Why This Matters: If I can build detection logic for RF threats across 6 sensor domains, I can build detection content for your SIEM/EDR platform.

View TraceLock Public Public Artifacts


Case summary

Problem Security teams face 12–18 minute RF blind spots during sweep operations; existing tools monitor single wireless domains with no cross-domain correlation
Environment Raspberry Pi 4 (8GB) · Python 3.10+ · Kismet · RTL-SDR V4 · Ubertooth · SQLite · GitHub Actions CI
What I built Real-time multi-domain sensor fusion: Wi-Fi + BLE + SDR + GPS + ADS-B correlation engine with forensic-grade logging and tunable detection thresholds
Framework mapping Detection engineering fundamentals · evidence-grade logging aligned with audit trail requirements · MITRE ATT&CK for ICS (RF threat vectors)
Measurable outcome Eliminates RF blind spots across 6 simultaneous domains; patent-pending architecture; WGU BSCSIA capstone (Mar 2026)
Artifacts Public repo · ~12,500 LOC · 25 Python modules · 81 shell scripts · example detection outputs

Governed Agentic Security Stack — Agentic Detection & Adversarial Validation Layer

Stack Position: TraceLock™ is the Agentic Detection & Adversarial Validation Layer of the Governed Agentic Security Stack — the layer that detects adversarial signals in the environment where AI-governed security workflows operate.

Architectural Risk Reduced: RF-layer blind spots that leave security operations without environmental threat visibility. A GRC platform that automates compliance workflows is only defensible if the physical environment it operates within is actively monitored.

Stack Layer: Agentic Detection (primary) · Adversarial Validation (secondary) · Evidence & Assurance (cross-layer) | Governed Agentic Security Stack

Relationship to GIAP™: GIAP™ governs compliance intake workflows. TraceLock™ monitors the physical RF environment those workflows operate within. Without detection coverage at this layer, GIAP™'s audit trails lack environmental context — a session conducted during active RF surveillance leaves no record of that condition.


The Problem

Executive protection and security teams face a critical gap: 12-18 minutes of RF blind spots during sweep operations. Existing tools monitor single domains (Wi-Fi OR Bluetooth OR SDR) without correlation, missing sophisticated threats that hop frequencies or use multiple channels.

Attack scenarios addressed:

  • Rogue Wi-Fi access points for credential harvesting
  • Bluetooth tracking devices (AirTags, Tiles, custom beacons)
  • ISM-band triggers for remote activation
  • GPS spoofing and jamming detection
  • Unauthorized drone surveillance (ADS-B correlation)

TraceLock vs. Traditional Wireless IDS

Capability Traditional WIDS TraceLock™
Domains monitored Wi-Fi only 6 domains (Wi-Fi, BLE, SDR, GPS, ADS-B, cellular)
Detection approach Signature-based Multi-domain correlation with behavioral analysis
Evidence grade Alert logs only Forensic-grade structured logging with chain of custody
Hardware Enterprise appliances ($10K+) Raspberry Pi + commodity SDR (~$200)
Deployment Fixed infrastructure Portable, field-deployable
Governance None SDOS-governed decision pipeline

Use Cases & Transferable Skills

Scenario Domain Skills Demonstrated
Executive Protection Physical Security Surveillance detection, persistence scoring, threat correlation
Detection Engineering SOC/SIEM Multi-source correlation, threshold tuning, false positive reduction
Forensic Evidence Legal/GRC Audit-grade logging, KML visualization, chain of custody
Drone Surveillance AAM/Critical Infrastructure ADS-B decoding, airspace monitoring, RF signal analysis

TraceLock™ addresses 25+ documented scenarios — from border security to disaster response. The same detection logic applies to any domain requiring multi-sensor correlation.


What I Built Beyond the Original

TraceLock™ is a security-hardened fork of CYT (Chasing Your Tail). Here's what I added:

Component Original CYT TraceLock™ (My Fork)
RF Domains Wi-Fi only Wi-Fi + Bluetooth + SDR + GPS + ADS-B
Security Basic 6 hardened modules (SQL injection prevention, encrypted credentials, input validation)
Detection Probe logging Multi-domain correlation engine with persistence scoring
Visualization Text logs KML with Google Earth integration, HTML reports
Hardware Single adapter 8-component core kit (RTL-SDR, Ubertooth, GPS, etc.) + HackRF extension
Status Proof of concept WGU BSCSIA capstone (complete)
Codebase ~2,000 LOC ~12,500 LOC (25 Python modules, 81 shell scripts)

What I Built

Hardware Platform (Field-Deployable Rapid Response Kit)

Component Purpose Capabilities
SBC (ARM-based) Core processing Runs Kismet + all TraceLock™ modules
Dual-band Wi-Fi adapter Wi-Fi monitoring Monitor mode, packet capture (2.⅘GHz)
SDR receiver ISM band + ADS-B Sub-GHz ISM bands, ADS-B (1090MHz)
Wideband SDR (Extension) Wideband SDR TX/RX Extended frequency range — optional expansion module
Long-range BT adapter Long-range Bluetooth Extended BLE scanning with external antenna
Short-range BT adapter Short-range Bluetooth Dense environment device detection
BLE research adapter BLE research Advanced BLE protocol analysis
GPS/LTE HAT GPS + LTE GNSS positioning, remote telemetry/VPN
Touchscreen display Field interface Local GUI for operator interface

Physical System Architecture

TraceLock physical system architecture

8-component RF sensor array with centralized processing and multi-channel output — demonstrates hardware integration and systems engineering

Software Architecture

TraceLock's detection architecture depends on the Agentic Infrastructure layer for reproducibility: the same detection rules must produce consistent output on every deployment. Hook-driven context loading and canonical install standards — established by the Agentic Infrastructure Audit — ensure that the agents operating TraceLock sessions produce audit-comparable results across machines.

Codebase: 25 Python modules, 81 shell scripts, ~12,500 LOC, GitHub Actions CI

Software architecture diagram withheld — the system processes data from 6 sensor domains through a detection engine to multiple output formats including structured logs, geospatial exports, and real-time alerts.

Python Modules

25 Python modules covering GPS tracking, persistence detection, RF analysis, BLE enumeration, ISM signal classification, surveillance detection, and operator interface — ~8,200 total Python LOC.

Module names and detailed breakdown withheld.

Security Modules (Hardened)

Module Protection LOC
mode_controller.py Role-based capture profiles (lab/demo/field) 304
input_validation.py Dedicated InputValidator class for all sensor inputs 300
secure_main_logic.py Secure monitoring logic with audit logging 262
secure_database.py SQL injection prevention — parameterized queries only 215
secure_credentials.py Fernet encryption with PBKDF2 key derivation (100k iterations) 214
secure_ignore_loader.py Safe allowlist loading — eliminated exec() calls 174

6 security modules — 1,469 LOC of hardened code


Detection Engineering Highlights

1. Multi-Domain Correlation

TraceLock™ correlates signals across domains to identify sophisticated threats:

TraceLock™ correlates events across multiple sensor domains to identify compound threats that single-domain tools miss. When signals from multiple domains converge, the system elevates the combined observation into a structured threat alert with full evidence chain.

Implementation details withheld.

2. Detection Rules with Tunable Thresholds

Detection Trigger Category False Positive Mitigation
Rogue AP Network identity anomaly Vendor validation + allowlisting
BLE Tracker Repeated device across locations Known device filtering
ISM Trigger Sub-GHz burst pattern Pattern library matching
GPS Anomaly Position discontinuity Multi-fix averaging
Drone Proximity ADS-B proximity alert Flight path prediction

Specific threshold values and trigger parameters are proprietary.

3. Security Hardening

  • SQL Injection Prevention: Parameterized queries for all database operations
  • Credential Protection: Encrypted storage with secure key derivation
  • Input Validation: Strict type checking on all sensor inputs
  • Audit Logging: Immutable event logs with cryptographic checksums
  • Mode Controller: Role-based capture profiles (lab/demo/field)

Results & Metrics

Metric Target Current Status
Detection accuracy (Wi-Fi) 95%+ Achieved
Detection accuracy (BLE) 95%+ Achieved
False positive rate <5% 3.2% (tuned)
Triage time reduction 50-70% Pending field validation
Sensor coverage 6 domains All operational

Evidence Artifacts

Architecture Overview

TraceLock™ uses a three-layer architecture: Sensor Layer (multi-domain RF inputs) → Processing Layer (normalization, correlation, detection) → Output Layer (forensic logs, geospatial exports, real-time alerts).

Detailed architecture diagrams are proprietary.

Sample Detection Output

TraceLock™ produces structured JSON alerts with timestamp, alert classification, severity rating, sensor evidence, geolocation, and correlation identifiers. Output is designed for forensic chain-of-custody requirements and downstream SIEM ingestion.

Sample output schema is proprietary. Synthetic examples available in the public repository.

KML Visualization

Threat locations mapped with temporal correlation — screenshots available on request


Compliance & Ethics

Requirement Compliance
FCC Part 15/97 Passive monitoring within regulations
FAA Part 107 Licensed drone pilot (certified)
Amateur Radio Licensed (HAM, GMRS)
WGU IRB Not human subjects research

Technical Skills Demonstrated

Detection Engineering

  • Custom detection rule development
  • Threshold tuning and optimization
  • False positive analysis and mitigation
  • Multi-source correlation logic
  • Alert severity classification

Security Automation

  • Python automation pipelines
  • Real-time data processing
  • Structured logging (JSON, Markdown)
  • CI/CD with GitHub Actions
  • Database operations (SQLite)

RF/Wireless Security

  • Wi-Fi monitoring and analysis
  • Bluetooth/BLE enumeration
  • SDR signal processing
  • GPS correlation
  • ADS-B decoding

Security Hardening

  • Secure coding practices
  • Credential encryption
  • Input validation
  • Audit trail design

Project Status

Phase Status Notes
Hardware Assembly ✅ Complete 8 core RF modules integrated, field-ready
Software Core ✅ Complete Detection engine operational on Pi
Security Hardening ✅ Complete All 6 security modules implemented
WGU Task 1 (Topic) ✅ Approved Official capstone approval received
WGU Task 2 (Proposal) ✅ Complete Submitted and approved
WGU Task 3 (Final Report) ✅ Complete Submitted and approved
IP Protection ✅ Active Proprietary
GitHub CI/CD ✅ Active Smoke tests on push

Degree Conferred: March 2026 (B.S. Cybersecurity & Information Assurance)


What This Demonstrates (Agentic Detection & Adversarial Validation Capabilities)

  1. I can build detection systems — Not just use them, but architect and implement custom detection logic
  2. I understand multi-domain correlation — The same thinking applies to SIEM correlation rules
  3. I write secure code — Parameterized queries, encrypted credentials, input validation
  4. I document for auditors — Evidence-grade logging with reproducible results
  5. I ship working systems — Hardware + software integration, not just theory


TraceLock™ demonstrates how adversarial signal detection can be governed as an architectural layer — not merely implemented as a collection of monitoring scripts.


TraceLock Public Repo Artifacts (Synthetic) Connect on LinkedIn Contact Me


Frequently Asked Questions

What is TraceLock? TraceLock is a multi-domain RF threat detection platform that monitors 6 wireless domains simultaneously — Wi-Fi, Bluetooth Low Energy, SDR (ISM band), GPS, ADS-B, and cellular — correlating threats across sensors to produce forensic-grade evidence logs.

How is TraceLock different from a traditional wireless IDS? Traditional WIDS monitors Wi-Fi only using signature-based detection. TraceLock correlates activity across 6 RF domains with behavioral analysis, runs on a ~$200 Raspberry Pi instead of $10K+ enterprise appliances, and produces chain-of-custody-ready evidence logs.

What hardware does TraceLock require? A Raspberry Pi ⅘, RTL-SDR dongle, HackRF One (optional), BLE-capable adapter, and GPS receiver. Total hardware cost is approximately $200, compared to $10,000+ for enterprise wireless security appliances.

What detection engineering skills does TraceLock demonstrate? Multi-source correlation, custom detection rule authoring with tunable thresholds, false positive reduction through pattern extraction, real-time alerting, structured logging pipelines, and security hardening (parameterized queries, encrypted credentials, input validation).