Mobility in today's world brings security risks and users can't rely on the network to protect them. We believe that providing transparency into threats and intelligence to expose threat groups brings clarity to users and enables defenders to better protect. The lack of trust has driven adoption of 3rd party secure services such as Signal, Threema, Wire, Proton, and others.
Mobile Surveillance Monitor (MSM) is a research initiative developed by the Mobile Intelligence Alliance, a US-based 501(c)(3) non-profit digital privacy organization created to increase transparency into surveillance threats to better equip global communities, fellow NGO’s, universities, and security researchers with tools to expose actors and repressive governments. Creating a movement to expose threats helps industry stakeholders improve security controls and accountability.
We bring device and network data together with the mobile network supply chain to create link and graph analysis tools. Investigators use these tools to research threats and answer questions previously thought to be impossible.
Mobile Surveillance Monitor uses geospatial analysis and visualization technologies to fuse threat information from multiple sources to deliver threat intelligence to researchers, investigators, and at-risk groups in the public interest. The project provides threat indications to "connect the dots" and reveal the sources, targets, and types of mobile surveillance attacks used by repressive nations and bad actors.
Mobile Surveillance Monitor respects and protects the privacy of mobile users in its efforts to reveal mobile surveillance threats. None of the information used by this solution includes a user's phone identity, location, or communications. The information we use is based on threat Indicators of Compromise (IOC) and Indicators of Attack (IOA), which are forensic indications of targeted attacks. IOC’s include evidence left by threat actors that an attack occurred. In essence, they are the breadcrumbs left behind from the attack. They provide information in Mobile Surveillance Monitor that can be measured and visualized. The digital evidence provided by MSM reveals that an attack occurred, how the threat actor conducted an attack, and in some cases what they were looking for.
As a digital privacy organization, we take your privacy very seriously and only use information for improving the service or to ensure we are providing value to you. We do not provide your information to any marketing organization. We may use email contact data to communicate by way of email with information requested by you. We may also invite you to events that may be of interest to you. Although opt-out requests are usually processed immediately, please allow up to seven (7) business days for a removal request to be completed.