Signed in as:
filler@godaddy.com
Signed in as:
filler@godaddy.com
The Workbook converts multi-source threat telemetry from millions of global sensors into powerful visual investigation tools. Designed for researchers and investigators, it reveals new insights into targeted attacks by employing spatial, contextual, and target clustering to create global context.
Use the registration link to receive more details on how to obtain licensed access to the Workbook.
If you've already registered, click here for access.
Reach us at info@surveillancemonitor.org if you don't get a 24 hour reply.
MSM Mobile Surveillance Link Map
Here are some examples of research tools available
Identify the locations of high risk vendor equipment
View the malware types used by actors and threat event volumes
Monitor monthly volume levels targeting countries
Attribute threat actors to a surveillance malware families
See network threats from source country, mobile network operator, and threat category
Find links and correlate malware families to isolate or find surveillance geographic targets
Copyright © 2024 Mobile Intelligence Alliance - All Rights Reserved.