The Wi-Fi Tools for Analysis and GEO-Locating (WTAG) training program is designed to review the capability of hidden devices in structures, peer-to-peer hidden communication through use of common devices such as PSP, Nintendo DS, iPhones and geo-location of those Wi-Fi devices. The program will also review real-world circumstance of Wi-Fi being involved in Child Pornography, Terrorism, and Child Exploitation.
The WTAG will review the threats, the exploits, and the defense techniques along with real-world investigative techniques available to Law Enforcement. An in-depth look at these fields, will expose the student to Wi-Fi threats through the eyes of an attacker. Using readily available and open-source tools and off-the-shelf devices, students will navigate through the techniques attackers use to exploit Wi-Fi devices, what information they can glean from a device and how this can be used. The use of Wi-Fi devices utilized for hidden communication and storage purposes will also be explored.
This program is designed for the intermediate to advanced skill level student.
Applicant must be a law enforcement officer/agent with arrest authority in the prevention, detection, apprehension, detention and/or investigation of felony and/or misdemeanor violations of federal, state, local, tribal, or military criminal laws; Direct Law Enforcement Support Personnel (DLESP); or employees of a federal, state, local, tribal or international agency who perform functions directly related to a law enforcement or Department of Homeland Security (DHS) mission but do not necessarily have the authority to carry and use firearms, make arrests and/or conduct searches with or without a warrant. This category of personnel may also include military personnel preparing for deployment.
This program is part of the FLETC's Cybercrime Track (FCT) or the Electronic Surveillance (ELSUR) Track. By entering FCT or ELSUR into the search window, other related Cyber Division programs can be found.
Required Training Materials
- Electronic Law and Evidence
- 802.11 Location and Exploitation
- 802.11 Location and Exploitation Overview
- Shadow Operation (WTAG)
- WIFI Location and Exploitation Tools
Program Contact Info