Mobile Surveillance Monitor
Mobile Surveillance Monitor
  • Home
  • Surveillance Dashboard
  • Threat Workbook
  • Threat Reports
  • Surveillance 101
  • About Us
  • Contact
  • More
    • Home
    • Surveillance Dashboard
    • Threat Workbook
    • Threat Reports
    • Surveillance 101
    • About Us
    • Contact
  • Sign In
  • Create Account

  • My Account
  • Signed in as:

  • filler@godaddy.com


  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • Surveillance Dashboard
  • Threat Workbook
  • Threat Reports
  • Surveillance 101
  • About Us
  • Contact

Account


  • My Account
  • Sign out


  • Sign In
  • My Account

Who We Are and How We Operate

Why We Do What We Do

Improving Security Through Transparency

Mobility in today's world brings security risks and users can't rely on the network to protect them. We believe that providing transparency into threats and intelligence to expose threat groups brings clarity to users and enables defenders to better protect.  The lack of trust has driven adoption of 3rd party secure services such as Signal, Threema, Wire, Proton, and others.


Mobile Surveillance Monitor (MSM) is a research initiative developed by the Mobile Intelligence Alliance, a US-based 501(c)(3) non-profit digital privacy organization created to increase transparency into surveillance threats to better equip global communities, fellow NGO’s, universities, and security researchers with tools to expose actors and repressive governments.  Creating a movement to expose threats helps industry stakeholders improve security controls and accountability.

The Most Complete Visibility Into Mobile Surveillance Risks

We bring device and network data together with the mobile network supply chain to create link and graph analysis tools.  Investigators use these tools to research threats and answer questions previously thought to be impossible.

Find out more

Privacy Policy and Statement of Principles

Mobile Surveillance Monitor uses geospatial analysis and visualization technologies to fuse threat information from multiple sources to deliver threat intelligence to researchers, investigators, and at-risk groups in the public interest.  The project provides threat indications to "connect the dots" and reveal the sources, targets, and types of mobile surveillance attacks used by repressive nations and bad actors.


Mobile Surveillance Monitor respects and protects the privacy of mobile users in its efforts to reveal mobile surveillance threats. None of the information used by this solution includes a user's phone identity, location, or communications. The information we use is based on threat Indicators of Compromise (IOC) and Indicators of Attack (IOA), which are forensic indications of targeted attacks. IOC’s include evidence left by threat actors that an attack occurred. In essence, they are the breadcrumbs left behind from the attack. They provide information in Mobile Surveillance Monitor that can be measured and visualized.  The digital evidence provided by MSM reveals that an attack occurred, how the threat actor conducted an attack, and in some cases what they were looking for.


As a digital privacy organization, we take your privacy very seriously and only use information for improving the service or to ensure we are providing value to you.  We do not provide your information to any marketing organization.  We may use email contact data to communicate by way of email with information requested by you.  We may also invite you to events that may be of interest to you.  Although opt-out requests are usually processed immediately, please allow up to seven (7) business days for a removal request to be completed.


Copyright © 2023 Mobile Intelligence Alliance - All Rights Reserved.

  • Mobile Dashboard View
  • Terms of Service
  • Brand Logos

This website uses cookies.

We only use cookies to analyze website traffic.  We do not store your information. Accepting the use of cookies will aggregate your data with all other user data.

DeclineAccept