Signed in as:
filler@godaddy.com
Signed in as:
filler@godaddy.com
Explore surveillance threats using the dashboard. Our Threat Workbook provides intelligence and investigation tools to hunt the actors, malware, and networks conducting surveillance operations.
The Mobile Dashboard page is optimized for viewing from small screen mobile web browsers.
We record surveillance threat events targeting at-risk global communities. The dashboard displays a history of mobile phone malware and mobile network-based threats to monitor this activity.
You may ask how does this happen? The short answer is that phones and networks are vulnerable, and threat actors exploit these vulnerabilities to conduct espionage operations to obtain:
See our Surveillance 101 page for details on how we identify and record threat events, and actions you can take to protect your privacy.
This file contains all current threat events recorded in the Surveillance Dashboard. It does not include details such as attributed threat actor, malware name, mobile network operator or network node type. Detailed information is available in the Threat Research Workbook.
Note that some attacks are labeled Unknown if the location is undetermined. Network threats only contain the source country location.
Surveillance Threat Totals_Oct_2022 (xls)
DownloadCopyright © 2023 Mobile Intelligence Alliance - All Rights Reserved.