On record at the United States Patent and Trademark Office
Utility 19/260,580 · Utility 19/234,443 · Provisional 63/798,670 · Trademark 99269171, Class 009 — NOA

Personal counter-surveillance,
in service of the operator.

Wars do not begin with tanks. They begin with surveillance — the quiet phase before every targeted act, in which adversaries map children's routes, the chambers of a hotel room, the audio of a boardroom. SPYNO is the wearable that detects the digital shadow following a person, and — within FCC §15.247, Section 333, and ETSI EN 300 328 — surgically suppresses it.

Detection
6 vectors
BLE 5 · Sub-GHz · NFC · Wi-Fi · Acoustic FFT · IR
Counter-vectors
4 active
Ultrasonic · BLE flood · Wi-Fi deauth · NFC spoof
Latency
1–10 s
3 s median · 90 s behavioural confirmation
Endurance
12–18 h
Continuous scan · 30 d standby
SPYNO — wearable counter-surveillance fob, machined aluminium chassis, signal-cyan status ring, engraved monogram.
System armed · Six vectors active
00 · Why we exist

Wars do not start with tanks.
They begin with surveillance.

The phase preceding every targeted attack — every kidnapping, every act of state-sponsored intimidation, every assassination — is surveillance. It is the cheapest, most ubiquitous, and most legally unprotected layer of modern conflict.

A thirty-dollar Bluetooth tracker, slipped into a child's rucksack, hands an adversary the family's daily geometry. A nine-dollar sub-GHz transmitter under a conference table captures the next strategic decision. A hidden Wi-Fi camera in a hotel suite records the journalist before the interview ends. The infrastructure for tracking individuals is already deployed, at planetary scale, in consumer-electronics form, mostly by people with no accountability.

The market response has been to ship applications that say "you're paranoid, there is nothing here," or hardware that breaks the law. Neither protects the operator. SPYNO is the third option — a wearable that detects the digital shadow following a person, and, within FCC §15.247, Section 333 of the Communications Act of 1934, and ETSI EN 300 328, surgically suppresses it.

Children at risk

BLE-class trackers slipped into a school rucksack reveal a child's route home, the playground, the chambers of the family residence. Apple's own stalking-detection arrives only after the device has been tracking for hours.

Source: NCMEC field reporting, 2023-2025

Hostile environments

Investigative journalists, dissidents, NGO field officers operate in places where surveillance is professional and the adversary is patient. A wearable detector at the personnel level closes the gap stationary sweep equipment cannot.

Source: CPJ & RWB security advisories

Executives & infrastructure

Pre-attack surveillance of executives and critical-infrastructure personnel is documented in DHS and FBI advisories as a precursor to targeted violence. SPYNO breaks that chain at the personnel level, where present countermeasures do not reach.

Source: DHS NTAS, CISA 2024-2025

Lawful by architecture

Every active vector is targeted, subscription-gated, and structurally distinct from broadband jamming. The same architecture covered in our USPTO Counter-Terrorism Petition to Make Special, filed under 37 CFR §1.102(c)(1).

USPTO Application 19/260,580
01 · Problem space

The threat surface keeps expanding.
No legal product closes it.

1.8B units

AirTag-class trackers in circulation, 2021-2026

Apple FindMy + Tile + Samsung SmartTag + Chipolo + Pebblebee combined installed base. Approximately one device per four mobile-phone owners worldwide.

Apple AAPL filings, Allied Market Research, Internal triangulation
67% rate

travellers report concern about hidden cameras in short-term lets

Concern reached majority post-2023 New York Times and Wirecutter coverage; 38% report personally encountering at least one device.

AAA Hospitality Survey 2024 · AHLA Hidden Camera Index
$4.7B tam

counter-surveillance hardware and service market, projected 2030

Combined consumer protective tech, executive protection equipment, and diplomatic procurement. Compound annual growth 14.2 % from 2024 baseline.

Mordor Intelligence · Allied Market Research
0 count

consumer products with FCC-compliant active counter-vectors

Existing devices are passive-only or operate as illegal jammers. The Federal Communications Commission has prosecuted six commercial parties for §15.247 violations since 2014.

FCC Enforcement Bureau public actions log
02 · How it works

From unaware to protected, in four motions.

Detection is automatic, continuous, and silent. Active suppression is operator-initiated and gated behind a signed credential. Every event — passive or active — lands in an encrypted forensic record retrievable only by the operator and designated reviewers.

  1. 01
    Form factor

    Wear it daily

    Clip on a keychain, pocket, or belt. 38 g machined-aluminium chassis. 12-18 hour endurance under continuous multi-vector scan; 30-day standby. No application required for passive detection.

    65 × 35 × 12 mm · IP54 (target) · -10 °C to +50 °C

  2. 02
    Detection regime

    It scans, in parallel

    Bluetooth 5 trackers, sub-GHz analogue transmitters at 433 / 868 MHz, NFC field probes, hidden Wi-Fi cameras across nine vendor families, and acoustic surveillance fingerprints — all six vectors, every second, on a single ESP32-S3 with hardware DSP.

    6 vectors · 1024-pt FFT @ 16 kHz · OUI database 9 vendors

  3. 03
    Alert pipeline

    It classifies, then alerts

    A real threat — not noise — triggers an LED-ring indication, a tactile vibration pulse, and an AES-256-GCM record in the encrypted forensic log. Optional notification to a paired iOS or Android device over Bluetooth Secure Connections.

    AES-256-GCM · BLE 5 LESC · 256-event ring buffer in PSRAM

  4. 04
    Active-mode lawfulness

    Engage Shield Mode

    Double-press the SHIELD control. Four targeted counter-vectors activate, each addressed only at the MAC addresses already classified — within FCC §15.247, 47 CFR Part 15.209, and ETSI EN 300 328. Subscription gate validates an Ed25519 token before any active feature can run.

    Ultrasonic 22 kHz · BLE flood · 802.11 deauth · NFC spoof

03 · Capability matrix

Six detection vectors. Four active counter-vectors. One device.

Every subsystem in the matrix is implemented in the v1.0 firmware on Espressif ESP32-S3FN16R8V (16 MB flash, 8 MB OPI octal PSRAM) with TI CC1101, NXP PN532, and Everest ES7210 audio. Each module maps 1:1 to a USPTO claim and to a source file an acquirer's engineer can audit in an afternoon.

01 Claim 1 · 8 · 11

BLE Tracker Detection

1–3 s · -75 dBm @ ≥ 10 m line-of-sight

Vendor-signature library covering Apple AirTag (FindMy 0x4C/00 + 0x12/19), Tile (ServiceUUID FEED/FEEC/FEDB), Samsung SmartTag (FD5A), Chipolo One/Spot (FEAB), Pebblebee Card (FE61). Behavioural fallback flags any unknown beacon held above threshold for ≥ 90 seconds.

→ firmware/src/scanners.cpp

02 Claim 1

Sub-GHz RF Persistence

CC1101 · 300–928 MHz · -70 dBm threshold

Detects analogue audio bugs holding the channel above background floor for 10 seconds; burst-pattern analysis filters garage doors, weather stations, and baby monitors. RX-only by default; transmit only during Shield Mode against pre-classified threats.

→ firmware/src/scanners.cpp::scan_for_rf_threat

03 Claim 1

NFC Field Detection

PN532 · 13.56 MHz · 3–5 cm

Instant alert when an external 13.56 MHz reader pings the device — covers card-skimmer probes in transit, hotel safes, and contactless attack scenarios. Polled at 300 ms intervals.

→ firmware/src/scanners.cpp

04 Continuation (CIP)

Wi-Fi Camera Discovery

OUI database · 9 vendors · SSID heuristics

Auto-identifies Hikvision, Dahua, TP-Link Tapo, Wyze, Reolink, Eufy, Wansview, Foscam, Amcrest cameras on adjacent SSIDs. Promiscuous-mode 1.5 s slot detects rogue beacon-spam attackers across 2.4 GHz channels.

→ firmware/src/wifi_scanner.cpp

05 Continuation (CIP)

Acoustic FFT

ES7210 PDM · 1024-pt @ 16 kHz

64 magnitude bins, 250 Hz per bin. Recognises 217 Hz GSM frame buzz (active 2G/3G transmission), 50/60 Hz coil-whine + harmonics (hidden-camera switching power supply), unexpected ultrasonic emissions. Office HVAC noise filtered.

→ firmware/src/acoustic_dsp.cpp

06 Claim 2 · 6 · 7

Shield Mode (4 vector)

Subscription-gated · Ed25519 JWT

Ultrasonic 22 kHz with 5-frequency hop · NimBLE flood per MAC · 802.11 deauth channel-locked · NFC card-emulation spoof. Targeted to MAC addresses already classified by the threat engine. Acoustic vector outside FCC; protocol vectors §15.247-compliant.

→ firmware/src/shield_mode.cpp + jwt.cpp

04 · Reference architecture

Eight industrial-grade components.
No exotic silicon. No single source.

Every line item is a recognised industrial-grade part with published lifecycle commitment. The v2.0 production PCB inherits the same bill of materials with dual-source qualification on every critical integrated circuit. Authoritative pinout reference is the Bruce open-source firmware (boards/lilygo-t-embed-cc1101/pins_arduino.h), regularly maintained against silicon revisions.

COMPUTE Espressif

ESP32-S3FN16R8V

Dual-core LX7 @ 240 MHz · BLE 5 · Wi-Fi 802.11 b/g/n · 16 MB flash · 8 MB OPI PSRAM · AI-DSP extensions

MCU + radios + on-device FFT

SUB-GHz Texas Instruments

CC1101

300–348 / 387–464 / 779–928 MHz · -110 dBm sensitivity · driven via RadioLib

Analog RF bug detection

NFC NXP

PN532

13.56 MHz · ISO 14443 A/B · FeliCa · target + initiator modes

NFC field detection + card-emulation spoof

AUDIO Everest + NSiWay

ES7210 + NS4168

PDM digital mic + I²S codec · 16 kHz capture @ 1024-pt FFT · 1 W class-D speaker amp

Acoustic FFT detector + voice alerts

DISPLAY Sitronix

ST7789V

1.9″ IPS · 320 × 170 · 500 cd/m² · driven via LovyanGFX

On-device UI shell

POWER Texas Instruments

BQ25896 + BQ27220

Li-Po charger up to 1.0 A · fuel gauge ±1 % accuracy · NTC-protected

Power delivery + battery telemetry

INDICATORS Worldsemi

8× WS2812B

Addressable RGB · 5 mm form · 70 cd/m²

Threat-class & priority indication

COUNTER Murata + Alpha & Omega

MA40S4S + AO3400

22 kHz piezo + logic-level N-MOSFET driver · +5 V rail · frequency-hopping LEDC PWM

Ultrasonic acoustic suppression (Shield Mode #1)

                 ┌────────────────────────────────────────┐
                 │      ESP32-S3FN16R8V (Espressif)       │
                 │  Dual LX7 · BLE 5 · Wi-Fi · 8 MB PSRAM │
                 └─┬──────┬──────┬──────┬──────┬──────┬───┘
                   │ HSPI │ I²C  │ I²S  │ LEDC │ ADC  │
       ┌───────────┘      │      │      │      │      └───────────┐
       │                  │      │      │      │                  │
   ┌───▼────┐  ┌──────────▼─┐  ┌─▼──────▼──┐  ┌▼─────┐  ┌─────────▼┐
   │ ST7789 │  │  PN532 NFC │  │ ES7210 +  │  │MA40S4│  │ BQ25896 ─┤
   │ TFT    │  │  +BQ27220  │  │ NS4168 +  │  │ +AO3400│  │  +Li-Po  │
   │ 320x170│  │  +charger  │  │ PDM mic + │  │ piezo │  │ 1300 mAh │
   └────────┘  └────────────┘  │ speaker   │  └───────┘  └──────────┘
                               └───────────┘
                                                ┌─────────┐
                  ┌──────────────────────────► │ CC1101  │
                  │           HSPI               │ sub-GHz │
                  │                              │ 300-928 │
                  │                              │   MHz   │
                  │                              └─────────┘
                  │
                  └─► WS2812×8 RGB ring (Worldsemi)
05 · Product line

Two product lines.
One architecture.

The same patent-pending core scales from a $349 consumer fob to a ruggedised operator unit deployed in adversarial environments. The defence variant is sold separately under appropriate export controls. Disclosed here for strategic transparency.

SPYNO product render
Consumer · Available

SPYNO

Personal counter-surveillance

Form factor
Wearable fob · 65 × 35 × 12 mm · 38 g
Detection
Six vectors continuously parallel
Active mode
Four counter-vectors · subscription-gated · Ed25519 JWT
Compliance
FCC §15.247 / §15.209 · ETSI EN 300 328 · UN38.3
Endurance
12-18 h continuous · 30-day standby
Pricing
$349 hardware · $99 / year service
Operator Brief
SPYNO / D product render
Defense · In development

SPYNO / D

Operator-grade variant for adversarial environments

Chassis
MIL-STD-810H ruggedised · -30 °C to +70 °C
Endurance
2200 mAh user-replaceable battery
Vector library
Operator-authorised under DoD context
Provenance
US-only manufacturing · DoD trusted-supplier path
Audit
Tamper-evident chain-of-custody log to ops dashboard
Pricing
Quote · per-seat · multi-year contract
Defense partner inquiry

Defence variant subject to ITAR / EAR review. Sold only to vetted government, allied-defence, and authorised commercial customers under written contract. The seed round does not fund the defence pivot; it preserves the architectural option.

06 · Intellectual property

A patent estate that travels with the hardware.

Counter-surveillance products historically die in legal review — broadband jamming violates Section 333 of the Communications Act and FCC Part 15. SPYNO's active layer is structurally different: ultrasonic emission is acoustic (outside FCC jurisdiction); BLE flood, Wi-Fi deauth, and NFC spoofing are MAC-targeted protocol responses against threats already classified by the on-device engine, not broadband noise. Every active feature is gated behind a signed subscription, providing documented usage control under Claim 7.

  • FCC Part 15.247 / §15.209-compliant active mode
  • Section 333 No broadband emission; no harmful interference posture
  • CFR 47 Acoustic countermeasures outside RF jurisdiction
  • EU ETSI EN 300 328 channel-utilization profile mapped
  1. 63/798,670 Provisional
    Filed
    2025-05-02
    Status
    On record

    Priority anchor for the full claim set including four-vector Shield Mode.

  2. 19/234,443 Utility 1
    Filed
    2025-06-11
    Status
    Filed

    First Utility nonprovisional. 30-page specification, 10-page figures.

  3. 19/260,580 Utility 2
    Filed
    2025-07-06
    Status
    In examination

    Active prosecution. First Office Action 2026-02-19. Counter-Terrorism Petition to Make Special on file (37 CFR §1.102(c)(1)).

  4. TM 99269171 Trademark
    Filed
    2025-07-06
    Status
    NOA issued · Class 009

    SPYNO mark — Notice of Allowance 2026-02-17. Published without opposition. Registers on Statement of Use.

07 · Competitive position

The quadrant nobody else can enter.

Detector apps say "you're paranoid." Pro RF detectors don't act. Jammers are illegal. SPYNO is the first wearable that detects and — within the law — neutralizes. The empty quadrant is structural, not coincidental: closing it requires the patent + legal architecture we have on file.

Active mode Passive only Pro & B2B Consumer
Pro · Active

No commercial product fits here. Defense / EP equipment with active capability is government-only.

SPYNO · Empty quadrant

Consumer · Active · Lawful

Wearable, multi-vector detection + targeted protocol-level countermeasures + cryptographic subscription gate. Patent-pending architecture protected against entry.

USPTO 19/260,580 FCC §15.247 Trademark Cl. 009
Pro · Passive
  • JJN Digital JJN6 Pro · $2,800
  • REI Mobile Locator Pro · $1,490
  • Selcom CSCM-200 · $4,200
Consumer · Passive
  • AirGuard / Tracker Detect · free
  • Hidden Camera Detector · $3
  • CC308+ Amazon RF toy · $30
Source: founder review, May 2026 · Full feature matrix in /specs.
08 · Demonstration

Live device simulation.
Four phases, cycling.

  1. Phase 01Boot sequence, scanner self-test, system ready
  2. Phase 02Live BLE constellation — 14 devices, 12 classified, 2 unknown
  3. Phase 03AirTag detected at -68 dBm, behavioral persistence over 90 s
  4. Phase 04Shield Mode engaged — JWT verified, 4 countermeasures running

Live simulation rendered in CSS · Filmed 90-second demo reel ships Q3 2026

09 · Pricing

One device. Three tiers of service.

The hardware never bricks. Detection always works. The subscription unlocks Shield Mode, cloud retention, and fleet capabilities for operators who need them.

Standard

For travelers, executives, journalists
$349 hardware
$99 / year unlocks Shield Mode
  • Six detection vectors
  • Four-vector Shield Mode
  • Encrypted forensic log
  • Mobile companion (iOS + Android)
  • 12-18 hour battery
  • 1-year warranty
Reserve
Most operators choose

Pro

For frequent operators
$399 hardware
$149 / year expanded service
  • Everything in Standard
  • Threat heatmap (room mapping)
  • 3-device fleet on one account
  • 1-year cloud log retention
  • API access (read)
  • 2-year warranty
Reserve

Operator

For EP, hospitality, defense
Quote B2B contract
Per-seat licensing Multi-year terms
  • Everything in Pro
  • Fleet management dashboard
  • Enterprise SSO
  • 3-year cloud retention
  • Priority SLA
  • Co-marketing case studies
  • SPYNO/D variant available
Contact sales
Reservations are non-binding. Production hardware ships Q3 2027 to verified subscribers. Operator tier requires signed MSA.
10 · Built by

A founder-built national-security wedge.

Every artifact in this data room — patent provisional, two utility applications, the trademark, ~3,500 lines of original C++ on real silicon, the 37-document v3.0 master pack — was authored by a single founder before the seed round opened.

We are not building another consumer-tech product. We are building the architectural answer to the surveillance layer of every modern conflict — from a child stalked through their backpack to a journalist tracked across borders. The legal and patent posture is not a moat we found. It is a moat we designed, because nothing else in this category survives FCC scrutiny.

Serhii Nikolaichuk CEO & sole founder
SPYNO — wearable counter-surveillance fob, machined aluminium chassis, signal-cyan status ring, engraved monogram.

v1.0 prototype rendering · Production v2.0 PCB Q2 2027

11 · Engagement

Request an Operator Brief.

For investors, acquirers, and authorized commercial partners. The brief includes the full capability matrix, USPTO filing pack, financial memorandum, manufacturing readiness, and a private demo session.

Response within 48 hours · direct mail to briefs@spyno.io
Request Operator Brief