Mobile Intelligence Alliance
Mobile Intelligence Alliance
  • Home
  • Who We Are
  • Resources
    • Threat Intelligence
    • Mobile Threat Map
  • Contact
  • About Gary Miller
  • More
    • Home
    • Who We Are
    • Resources
      • Threat Intelligence
      • Mobile Threat Map
    • Contact
    • About Gary Miller
  • Home
  • Who We Are
  • Resources
    • Threat Intelligence
    • Mobile Threat Map
  • Contact
  • About Gary Miller
Mobile Threat Map

Threat Intelligence Reports

MIA publishes independent intelligence reports that expose real cyber threats targeting mobile phone users, including networks and country sources of the attacks with implications on future technologies. These reports also uncover vulnerabilities related to applications and services which use mobile networks.

FAR FROM HOME - Active Mobile Surveillance Intelligence Reports

The Far From Home series of reports provides an in-depth overview of mobile cyber espionage threats targeting US phones, revealing the methods used by threat actors, the countries, and the operators involved based on independent expert investigations into attack data from state sponsors and organized crime entities.

Far From Home Threat Intelligence - 2018-2020 Attacks

Originally created by Exigent Media, these reports provide targeting classifications, surveillance methods, forward-looking risk assessments and rankings of active mobile threats.

Far From Home Threat Intelligence 2018-2019 (pdf)Download
Far From Home Threat Intelligence 2020 (pdf)Download

Mobile Surveillance Monitor Threat Reports

September 2022 - Remote Access Trojans and Cy4gate Spyware Analysis

Published by Mobile Surveillance Monitor - this report provides a review of Remote Access Trojan malware and details into spyware threats sourced from the Italian surveillance company Cy4gate

View Report

Mobile Security Research Links

Industry & Government Guidelines

Publicly Available Surveillance Media Stories

Publicly Available Surveillance Media Stories

  • http://events.ccc.de/congress/2014/Fahrplan/system/attachments/2553/original/31c3-ss7-locate-track-manipulate.pdf


  • https://www.itu.int/en/ITU-T/Workshops-and-Seminars/201606/Pages/default.aspx


  • https://www.fcc.gov/files/csric5-wg10-finalreport031517pdf


  • http://icc2017.ieee-icc.org/


  • https://www.homeaffairs.gov.au/about-us/our-portfolios/national-security/lawful-access-telecommunications/telecommunications-interception-and-surveillance


  • https://link.springer.com/chapter/10.1007/978-3-319-64701-2_45


  • https://transition.fcc.gov/pshs/advisory/csric4/CSRIC_IV_WG4_Final_Report_031815.pdf


  • https://www.enisa.europa.eu/publications/signalling-security-in-telecom-ss7-diameter-5g


  • https://docs.fcc.gov/public/attachments/DA-20-141A1.pdf


  • https://www.fcc.gov/file/13925/download


  • https://www.dhs.gov/publication/csd-mobile-device-security-study


  • https://www.dhs.gov/publication/st-mobile-security-rd-program-guide


  • https://ecfsapi.fcc.gov/file/10503106179911/180503%20CTIA%20Comments%20SS7.pdf


  • https://www.ntia.doc.gov/files/ntia/publications/ctia_comments_re_ntia_national_strategy_to_secure_5g_implementation_plan.pdf


  • https://www.enisa.europa.eu/publications/enisa-threat-landscape-report-for-5g-networks/at_download/fullReport


  • https://www.gsma.com/security/resources/fs-07-ss7-and-sigtran-network-security-v4-0/


  • https://www.gsma.com/security/resources/ir-82-ss7-security-network-implementation-guidelines-v5-0/


  • https://www.gsma.com/security/wp-content/uploads/2020/02/FS.31-v2.0.pdf


  • https://www.itu.int/en/ITU-T/extcoop/figisymposium/Documents/ITU_SIT_WG_Technical%20report%20on%20the%20SS7%20vulnerabilities%20and%20their%20impact%20on%20DFS%20transactions.pdf


  • https://www.gsma.com/security/resources/fs-11-ss7-interconnect-security-monitoring-and-firewall-guidelines-v6-0/


  • https://www.gsma.com/security/resources/fs-20-gprs-tunnelling-protocol-gtp-security-v3-0/


  • https://www.gsma.com/security/resources/fs-21-interconnect-signalling-security-recommendations-v6-0/


  • https://www.gsma.com/security/resources/fs-31-gsma-baseline-security-controls/


  • https://www.gsma.com/security/resources/fs-34-key-management-for-4g-and-5g-inter-plmn-security/


  • https://www.gsma.com/security/resources/fs-37-gtp-u-security/


  • https://www.gsma.com/security/resources/ir-82-ss7-security-network-implementation-guidelines-v5-0/

Publicly Available Surveillance Media Stories

Publicly Available Surveillance Media Stories

Publicly Available Surveillance Media Stories

  • https://www.theguardian.com/us-news/2020/dec/15/revealed-china-suspected-of-spying-on-americans-via-caribbean-phone-networks


  • https://www.thebureauinvestigates.com/stories/2020-12-16/spy-companies-using-channel-islands-to-track-phones-around-the-world


  • https://techcrunch.com/2020/12/30/nso-fleming-data-location/


  • https://www.theguardian.com/world/2020/dec/16/israeli-spy-firm-suspected-accessing-global-telecoms-channel-islands


  • https://www.theguardian.com/world/2020/mar/29/revealed-saudis-suspected-of-phone-spying-campaign-in-us


  • https://www.vice.com/en/article/mbzvxv/criminals-hackers-ss7-uk-banks-metro-bank


  • https://www.zdnet.com/article/5g-networks-could-be-vulnerable-to-exploit-due-to-mishmash-of-old-technologies/


  • https://www.theregister.co.uk/2014/12/26/ss7_attacks/


  • https://www.thedailybeast.com/you-can-spy-like-the-nsa-for-a-few-thousand-bucks


  • https://www.ptsecurity.com/upload/ptcom/SS7-VULNERABILITY-2016-eng.pdf


  • http://2014.hackitoergosum.org/slides/day3_Worldwide_attacks_on_SS7_network_P1security_Hackito_2014.pdf


  • http://2014.hackitoergosum.org/slides/day1_Hacking-telco-equipment-The-HLR-HSS-Laurent-Ghigonis-p1sec.pdf


  • https://www.washingtonpost.com/business/technology/for-sale-systems-that-can-secretly-track-where-cellphone-users-go-around-the-globe/2014/08/24/f0700e8a-f003-11e3-bf76-447a5df6411f_story.html?utm_term=.33db0bf4c1


  • http://events.ccc.de/congress/2014/Fahrplan/system/attachments/2493/original/Mobile_Self_Defense-Karsten_Nohl-31C3-v1.pdf


  • https://www.cbsnews.com/news/60-minutes-hacking-your-phone/


  • https://eng.nkom.no/topical-issues/news/nordic-authorities-collaborating-on-measures-against-vulnerabilities-in-networks


  • https://www.corelan.be/index.php/2014/05/30/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency/


  • http://www.sueddeutsche.de/digital/it-sicherheit-schwachstelle-im-mobilfunknetz-kriminelle-hacker-raeumen-konten-leer-1.3486504


  • https://www.theregister.co.uk/2017/09/18/ss7_vuln_bitcoin_wallet_hack_risk/


  • https://www.digi.no/artikler/roper-hvem-som-forarsaket-telenors-mobil-havari/348087


  • https://www.adaptivemobile.com/blog/malicious-data-interception-via-ss7


  • https://www.adaptivemobile.com/blog/ss7-security-putting-pieces-together


  • https://wikileaks.org/hackingteam/emails/emailid/133908


  • https://www.blackhat.com/docs/us-17/wednesday/us-17-Kacer-SS7-Attacker-Heaven-Turns-Into-Riot-How-To-Make-Nation-State-And-Intelligence-Attackers-Lives-Much-Harder-On-Mobile-Networks.pdf


  • https://www.capacitymedia.com/articles/3825262/attempts-to-infiltrate-4g-networks-100-successful-


  • https://www.thebureauinvestigates.com/stories/2020-12-16/the-rapid-rise-of-phone-surveillance-firms


  • https://citizenlab.ca/2020/12/running-in-circles-uncovering-the-clients-of-cyberespionage-firm-circles/


  • https://web.archive.org/web/20190409205521/https://www.alaraby.co.uk/file/get/4749a75b-fc46-4917-85d3-7f8b41d4b34a


  • https://www.forbes.com/sites/thomasbrewster/2020/12/01/this-spy-tool-can-find-you-with-just-a-telephone-number-and-25-countries-own-it-warn-researchers/?sh=71531793331e

Copyright © 2022 The Mobile Intelligence Alliance, IRS EIN# 86-3743950

This website uses cookies.

We only use cookies to analyze website traffic and optimize your website experience.  We do not track users or sell user data.

DeclineAccept