Research Instrument

The Watchdog
WiFi Network Research Monitor

Every Frequency Accounted For.

Passive WiFi network monitoring for compound security research. Detects rogue access points, deauthentication attacks, unknown devices, and movement patterns across buildings.
Watchdog Monitor
Compound Network Dashboard
Monitoring Mode Passive Only
Chain of Custody SHA-256
Log Encryption AES-256-GCM
Device Registry Building-Aware
Anti-Misuse Self-Destruct
Classification Research Instrument
-- Nodes Deployed
$0 Firmware Cost to Individuals
0 Packets Transmitted

Passive network monitoring for compound security research. Reads broadcast frames. Never injects. Every observation hashed, encrypted, and logged. Published methodology. Peer-reviewable. Institutional-grade.

See Everything. Touch Nothing.

The Watchdog monitors WiFi activity across your compound without ever transmitting a packet. It reads what is already being broadcast and records it with forensic-grade integrity.

Passive Monitoring Only

Reads broadcast frames only. Never injects packets, never sends deauth frames, never transmits on any frequency. Observe and record. That is the entire scope.

Deauth Flood Detection

Detects deauthentication frame floods -- the signature of active network attacks. Logs source MAC, timestamp, frequency, and target. Forensic evidence of hostile activity on your network.

Rogue AP / Evil Twin Alerts

Identifies access points impersonating your network SSID. Detects evil twin attacks by comparing BSSID against the building-aware device registry. Unknown AP broadcasting your name = alert.

Device Whitelist + Unknown Alerting

Register every known device in the compound. Building-aware -- knows which device belongs where. Unknown MAC appears = alert with timestamp, signal strength, and estimated location.

Building-to-Building Movement Tracking

Tracks device movement across multiple Watchdog nodes. A device seen in Building A then Building B generates a movement event. Pattern analysis across the compound. Forensic timeline.

Daily Forensic Summary Reports

Every 24 hours, the device generates a forensic summary: new devices seen, deauth events, rogue APs detected, movement patterns, anomalies. SHA-256 hash chain. JSON dashboard export.

Network Research Monitor -- Not an Attack Tool

This is a network research monitor. It has no offensive capability by design. It cannot send deauth frames, cannot inject packets, cannot spoof identities. The self-destruct protocol activates on any detected attempt to modify firmware for offensive use. No exceptions. No refunds.

Three Tiers. One Mission.

Choose the hardware that fits your deployment. All tiers run the same Watchdog firmware. All produce identical forensic output. The difference is range, storage, and form factor.

Pico W
Raspberry Pi Pico W
$6
per unit / hardware cost only
  • 2.4 GHz monitoring
  • Standalone firmware (no computer)
  • SHA-256 chain of custody
  • AES-256-GCM encrypted logs
  • Micro-footprint deployment
  • Best for: single room coverage
Raspberry Pi
Raspberry Pi 4/5 + External WiFi
$53+
per unit / hardware cost only
  • 2.4 GHz + 5 GHz monitoring
  • Full Linux environment
  • Extended storage (SD card)
  • Dashboard server capable
  • Multi-node coordinator
  • Best for: compound hub + dashboard

Forensic Integrity at Every Layer

Every specification serves the research mission. Passive observation. Cryptographic logging. Published methodology.

Specification Detail
Monitoring Mode Passive only -- reads broadcast frames, never transmits
Hashing Algorithm SHA-256 sequential chain (each entry references previous hash)
Encryption AES-256-GCM (authenticated encryption with associated data)
Detection: Deauth Deauthentication frame flood detection with source MAC logging
Detection: Rogue AP Evil twin / rogue access point identification via BSSID registry
Device Registry Building-aware whitelist. Unknown device alerting with RSSI estimation.
Movement Tracking Cross-node device movement correlation across compound nodes
Reporting Daily forensic summary (JSON). Compound dashboard export.
Anti-Misuse Protocol Firmware self-destruct on offensive modification detection. Irreversible.
Firmware Standalone. No computer needed to operate. Runs on bare metal.
Data Sovereignty All data stays on-device or local network. No cloud. No telemetry.
Methodology Published and peer-reviewable. Open research protocol.
Classification Research instrument. machentagar.ca Research Institute.

Institutions Pay. People Get It Free. Always.

Frederick Banting sold his insulin patent for $1 because he believed life-saving tools should be accessible. The Watchdog follows the same principle. Veterans and First Nations communities pay nothing. Ever.

One Shot
$49 CAD

Single licence. One node. Full capability.

  • Full Watchdog firmware
  • All detection capabilities
  • SHA-256 chain of custody
  • AES-256-GCM encrypted logs
  • Daily forensic summaries
  • Self-destruct anti-misuse
Buy Now -- $49 CAD
Compound Pack
$149 CAD

Five licences. Full compound coverage. Best value.

  • Five full Watchdog nodes
  • Full compound mesh coverage
  • Cross-building movement tracking
  • Compound-wide dashboard export
  • Daily forensic summaries (all)
  • Self-destruct anti-misuse (all)
Buy Now -- $149 CAD
Law Firm / Property Mgmt
$1,000 CAD

Per shot. Institutional deployment. Volume terms available.

  • Everything in standard tiers
  • Multi-site deployment support
  • Custom device registry config
  • Dashboard integration
  • Training documentation
  • Priority support
Buy Now -- $1,000 CAD

All prices in Canadian dollars. Hardware cost not included (as low as $6/node). No refunds. Self-destruct on misuse. Research instrument -- not an attack tool. All proceeds reinvested into housing, social reform, and community grants via 15988730 Canada Inc.