A paramilitary company was warned regarding a leak of their sensitive data being sold in the deep web. The leak was traced back to their WiFi.
As an Incident Response team, we first mapped the damage with an effort to contain it, then launched two parallel defense-vectors. One was an intelligence effort, trying to map to identity of the leaker, the assets leaked etc. The second was an RF effort to try and get our hands on the leaking device.