Mobile Surveillance Monitor
Mobile Surveillance Monitor
  • Home
  • Surveillance Dashboard
  • Threat Workbook
  • Threat Alerts
  • Threat Reports
  • Surveillance 101
  • About Us
  • Contact
  • Blank
  • More
    • Home
    • Surveillance Dashboard
    • Threat Workbook
    • Threat Alerts
    • Threat Reports
    • Surveillance 101
    • About Us
    • Contact
    • Blank
  • Home
  • Surveillance Dashboard
  • Threat Workbook
  • Threat Alerts
  • Threat Reports
  • Surveillance 101
  • About Us
  • Contact
  • Blank

Over 3 Million Network & Phone Threats Located

Explore targeted mobile surveillance using the dashboard.  Setup Threat Alerts to be notified when our system detects major surges in surveillance events targeting certain countries.

Are You Viewing This From a Phone? Try Our Mobile Dashboard

The Mobile Dashboard page is optimized for viewing from small screen mobile web browsers.

What is a Surveillance Dashboard?

Browse, Click, Protect

We record surveillance threat events targeting at-risk global communities.  The dashboard displays a history of mobile phone malware and mobile network-based threats to monitor this activity.


You may ask how does this happen?  The short answer is that phones and networks are vulnerable, and threat actors exploit these vulnerabilities to conduct espionage operations to obtain:


  1. Your Location - Location can be discovered and disclosed from the device and network 
  2. Your Communications - Messages can be viewed, calls can be recorded or intercepted
  3. Your Phone Information - Contacts, apps and camera be seen using device malware


See our Surveillance 101 page for details on how we identify and record threat events, and the actions you can take to protect your privacy.

Threat Event Extract File

This file contains all current threat events recorded in the Surveillance Dashboard.  It does not include details such as attributed threat actor, malware name, mobile network operator or network node type.  Detailed information is available in the Threat Research Workbook.


Note that some attacks are labeled Unknown if the location is undetermined. Network threats only contain the source country location.

Surveillance Threat Totals_Oct_2022 (xls)

Download

Copyright © 2022 Mobile Intelligence Alliance - All Rights Reserved.

  • Mobile Dashboard View

This website uses cookies.

We only use cookies to analyze website traffic.  We do not store your information. Accepting the use of cookies will aggregate your data with all other user data.

DeclineAccept