Every Frequency Accounted For.
Passive WiFi network monitoring for compound security research. Detects rogue access points, deauthentication attacks, unknown devices, and movement patterns across buildings.
Passive network monitoring for compound security research. Reads broadcast frames. Never injects. Every observation hashed, encrypted, and logged. Published methodology. Peer-reviewable. Institutional-grade.
The Watchdog monitors WiFi activity across your compound without ever transmitting a packet. It reads what is already being broadcast and records it with forensic-grade integrity.
Reads broadcast frames only. Never injects packets, never sends deauth frames, never transmits on any frequency. Observe and record. That is the entire scope.
Detects deauthentication frame floods -- the signature of active network attacks. Logs source MAC, timestamp, frequency, and target. Forensic evidence of hostile activity on your network.
Identifies access points impersonating your network SSID. Detects evil twin attacks by comparing BSSID against the building-aware device registry. Unknown AP broadcasting your name = alert.
Register every known device in the compound. Building-aware -- knows which device belongs where. Unknown MAC appears = alert with timestamp, signal strength, and estimated location.
Tracks device movement across multiple Watchdog nodes. A device seen in Building A then Building B generates a movement event. Pattern analysis across the compound. Forensic timeline.
Every 24 hours, the device generates a forensic summary: new devices seen, deauth events, rogue APs detected, movement patterns, anomalies. SHA-256 hash chain. JSON dashboard export.
Choose the hardware that fits your deployment. All tiers run the same Watchdog firmware. All produce identical forensic output. The difference is range, storage, and form factor.
Every specification serves the research mission. Passive observation. Cryptographic logging. Published methodology.
| Specification | Detail |
|---|---|
| Monitoring Mode | Passive only -- reads broadcast frames, never transmits |
| Hashing Algorithm | SHA-256 sequential chain (each entry references previous hash) |
| Encryption | AES-256-GCM (authenticated encryption with associated data) |
| Detection: Deauth | Deauthentication frame flood detection with source MAC logging |
| Detection: Rogue AP | Evil twin / rogue access point identification via BSSID registry |
| Device Registry | Building-aware whitelist. Unknown device alerting with RSSI estimation. |
| Movement Tracking | Cross-node device movement correlation across compound nodes |
| Reporting | Daily forensic summary (JSON). Compound dashboard export. |
| Anti-Misuse Protocol | Firmware self-destruct on offensive modification detection. Irreversible. |
| Firmware | Standalone. No computer needed to operate. Runs on bare metal. |
| Data Sovereignty | All data stays on-device or local network. No cloud. No telemetry. |
| Methodology | Published and peer-reviewable. Open research protocol. |
| Classification | Research instrument. machentagar.ca Research Institute. |
Frederick Banting sold his insulin patent for $1 because he believed life-saving tools should be accessible. The Watchdog follows the same principle. Veterans and First Nations communities pay nothing. Ever.
Single licence. One node. Full capability.
Three licences. Save $48. Multi-room coverage.
Five licences. Full compound coverage. Best value.
Per shot. Institutional deployment. Volume terms available.
Always free. No exceptions. No means testing. No expiry.
Veterans conducting personal compound security research. First Nations communities -- distribute to membership, unlimited. Indigenous Community Edition included.
Apply for Free LicenceAll prices in Canadian dollars. Hardware cost not included (as low as $6/node). No refunds. Self-destruct on misuse. Research instrument -- not an attack tool. All proceeds reinvested into housing, social reform, and community grants via 15988730 Canada Inc.