TSCM Cyber Applications

In a constrained operational environment the TSCM technician is often called upon to improvise techniques and repurpose commercial equipment to be successful. This commercial-off-the-shelf (COTS) TSCM course will be focused on commercial RF and pentesting gear to give the TSCM operator options where high grade equipment is limited or not available. We will also explore alternative detection techniques where traditional TSCM gear may fall short.

Much of the content of this course will explore the possibilities of using commercial WiFi, Bluetooth and software defined radio (SDR) gear in an investigative fashion. This will include leveraging hardware such as the WiFi Pineapple and HackRF as well as software such as TEMPEST SDR and HackRF Sweep.

In addition, students will learn how to use COTS radio and pentesting gear to augment or replace equipment in constrained operational theaters. This knowledge will be reinforced with daily exercises and will continue to be fostered through student take home equipment and training devices.

Topics will include finding rogue Bluetooth clients, finding rogue WiFi clients, locating rogue access points, leveraging the WiFi Pineapple for device detection and location, using software defined radios for TSCM, host defense techniques, leveraging pentesting gear for host defense, and basic Linus familiarization.

Students will receive:

  • Ubertooth One
  • WiFi Pineapple
  • HackRF One
  • Portapack
  • Raspberry Pi 4 Kit
  • Raspberry Pi Touchscreen
  • Headphones
  • USB Battery Pack
  • Wireless and Wired Keyboard
  • Portable HDMI Monitor
  • Shielded USB Cabling
  • A/V Cabling
  • USB Drive with Course Material
  • Remote Latch Relays



Huntsville, AL




5 days

Class Min/Max

3-12 Students



Day 01

Linux Primer
Bluetooth Classic
Bluetooth LE
Bluetooth & Linux
Ubertooth One

Day 02

Bluetooth Lab 1
Bluetooth Lab 2
WiFi Infrastructure

Day 03

WiFi Tracking 1
Tracking WiFi Clients
WiFi Pineapple

Day 04

Arming the Pineapple
WiFi Tracking 2

Day 05

HackRF Basics
SDR Software
SDR Attacks
Tempest SDR
HackRF Portapack

Scroll to Top