Advanced Physical Threat Detection for iOS Devices
Signal Scout turns your iPhone into a physical-layer threat detection instrument.
It monitors wireless emissions, electromagnetic anomalies, optical reflections, and ultrasonic beacons associated with tracking, surveillance, or harassment devices.
Built for privacy first personal security, research, and hardware threat awareness.
| Feature Category | Description |
|---|---|
| Bluetooth Tracking | Discovers known/unknown AirTags, BLE beacons, spoofed device IDs |
| Wi-Fi Security | Rogue AP detection, SSID spoofing alerts, MAC hopping fingerprinting |
| EMF / Magnetic Field | Detects abnormal field spikes often caused by hidden electronics |
| Ultrasonic Monitoring | Detects near-ultrasonic signals used in proximity marketing / tracking |
| Optical Surveillance | IR reflection scanning to detect hidden cameras and optical sensors |
| Event Correlation | Cross-sensor rule engine flags hardware reconnaissance behavior |
| Threat Mapping | GPS + RSSI mapping for persistence patterns (vehicle tracking, stalking) |
| Private Storage | No cloud logging. All data stays on device, with optional export to JSON |
Designed to help identify physical tracking and environmental surveillance risks.
- Actively developed
- iOS-only internal research build
- Available for non-commercial personal security use
| Component | API / Framework |
|---|---|
| Wireless Analysis | CoreBluetooth, NEHotspotNetwork, Network.framework |
| Location & Motion | CoreLocation, CoreMotion |
| Optical Surveillance Scanning | AVFoundation, CoreImage |
| Audio Spectrum Analysis | Accelerate FFT |
| Event Processing | Swift Concurrency / Combine architecture |
| Visual Interface | SwiftUI modular view system |
All modules log independently for repeatable forensic analysis.
Modern tracking no longer relies on malware - but wireless signals:
| Threat Vector | Exposure Example |
|---|---|
| AirTag-style stalking | Vehicles, luggage, personal movement tracking |
| WiFi honeypots | Credential harvesting, MITM, location following |
| EMF anomalies | Hidden electronics in living spaces or hotel rooms |
| Ultrasonic beacons | Retail surveillance tracking presence and behavior |
| IR camera concealment | Covert observation in rentals / public spaces |
Signal Scout helps reveal surveillance mechanisms that leave no digital trace.
This project uses Business Source License 1.1
Permitted:
- Personal use
- Security research
- Transparency projects
- Academic testing
Not permitted without commercial agreement:
- App Store or commercial distribution
- Commercial forks
- Monetized modifications
See LICENSE for legal terms and future conversion schedule.
| Physical Threat Behavior | ATT&CK-Inspired Category |
|---|---|
| Hidden tracker presence | T1020 – Data exfiltration over physical mediums |
| WiFi impersonation | T1557 – Adversary-in-the-middle |
| BLE identifier rotation | T1407 – Obfuscated signals |
| Camera covert IR | T1123 – Audio/visual capture |
| Ultrasonic beaconing | T1008 – Covert signaling channels |
| Persistent proximity | T1056 – Environmental monitoring |
For hardware reconnaissance behavior classification.
Signal Scout integrates:
- Apple Core APIs (Bluetooth, Location, Camera, Motion)
- Public OUI database for vendor matching
- Accelerate FFT for ultrasonic analysis
No third-party analytics. Zero telemetry.