Mobile devices and networks weren't designed with modern espionage threats in mind. Today, both mobile infrastructure and devices expose users to serious risks, and users can't rely on their devices or mobile carriers for security.
At Mobile Surveillance Monitor, we believe that transparency is a powerful defense. By exposing mobile surveillance threats and mapping the infrastructure used by threat actors, we empower defenders, researchers, and end users to take informed action.
Mobile Surveillance Monitor (MSM) is a research initiative of the Mobile Intelligence Alliance, a US-based 501(c)(3) nonprofit committed to defending digital privacy. MSM was created to increase visibility into mobile espionage threats and equip researchers and defenders with tools to uncover targeted attacks, improve defenses, and hold threat actors accountable.
We combine telemetry from live devices, mobile networks, and authoritative mobile carrier data to provide visibility into the mobile threat landscape. Our tools help cyber and intelligence professionals answer questions that were previously out of reach.
Mobile Surveillance Monitor uses geospatial analysis and visualization technologies to fuse threat information from multiple sources to deliver threat intelligence to researchers, investigators, and at-risk groups in the public interest. The project provides threat indications to "connect the dots" and reveal the sources, targets, and types of mobile surveillance attacks used by repressive nations and bad actors.
Mobile Surveillance Monitor respects and protects the privacy of mobile users in its efforts to reveal mobile surveillance threats. None of the information used by this solution includes a user's phone identity, location, or communications. The information we use is based on threat Indicators of Compromise (IOC) and Indicators of Attack (IOA), which are forensic indications of targeted attacks. IOC’s include evidence left by threat actors that an attack occurred. In essence, they are the breadcrumbs left behind from the attack. They provide information in Mobile Surveillance Monitor that can be measured and visualized. The digital evidence provided by MSM reveals that an attack occurred, how the threat actor conducted an attack, and in some cases what they were looking for.
As a digital privacy organization, we take your privacy very seriously and only use information for improving the service or to ensure we are providing value to you. We do not provide your information to any marketing organization. We may use email contact data to communicate by way of email with information requested by you. We may also invite you to events that may be of interest to you. Although opt-out requests are usually processed immediately, please allow up to seven (7) business days for a removal request to be completed.