Mobility in today's world brings security risks and users can't rely on the network to protect them. We believe that providing transparency into threats and intelligence to expose threat groups brings clarity to users and enables defenders to better protect. The lack of trust has driven adoption of 3rd party secure services such as Signal, Threema, Wire, Proton, and others.
Mobile Surveillance Monitor (MSM) is research initiative developed by the Mobile Intelligence Alliance; a US-based 501(c)(3) non-profit digital privacy organization created to increase transparency into surveillance threats to better equip global communities, fellow NGO’s, universities, and security researchers with tools to expose actors and repressive governments. Creating a movement to expose threats helps industry stakeholders to improve security controls and accountability.
We bring device and network data together with the mobile network supply chain to create link and graph analysis tools. Investigators use these tools to research threats and answer questions previously thought to be impossible.
Mobile Surveillance Monitor uses geospatial analysis and visualization technologies to fuse threat information from multiple sources to enhance the collaboration and intelligence of researchers, investigators, and at-risk groups in the public interest. The project provides threat indications to "connect the dots" and reveal the sources, targets, and types of mobile surveillance attacks used by repressive nations and bad actors.
Mobile Surveillance Monitor respects and protects the privacy of mobile users in its efforts to reveal mobile surveillance threats. None of the information used by this solution includes a user's phone identity, location, or communications of mobile users. The information we use is based on threat Indicators of Compromise (IOC’s) and Indicators of Attack, which are the forensic indications of targeted attacks. IOC’s are the evidence left by threat actors that an attack occurred. In essence, they are the breadcrumbs left behind from the attack. They provide warning signs so that the information in Mobile Surveillance Monitor can be measured and visualized. The digital evidence provided by MSM reveals not only that an attack occurred, but how the threat actor conducted an attack and in many cases what they were looking for.
As a digital privacy organization, we take your privacy very seriously and only use information for improving the service or to ensure we are providing value to you. We do not provide your information to any marketing organization. We may use email contact data, Cookie and Device Data to communicate with you by way of email alerts or information requested by you. We may also invite you to events that may be of interest to you. Although opt-out requests are usually processed immediately, please allow ten (10) business days for a removal request to be processed.